<?xml version="1.0" encoding="UTF-8" ?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>IPWorx.com-News From Around The Web</title>
    <subtitle>IPWorx.com-News From Around The Web</subtitle>
    <link href="https://www.ipworx.com/feed/webfeed/" rel="self"/>
    <id>https://www.ipworx.com/</id>
    <updated>2023-05-19T22:06:28+00:00</updated>
    <generator uri="https://wprssaggregator.com" version="4.23.1">
        WP RSS Aggregator
    </generator>

        <entry>
    <id>https://redmondmag.com/webcasts/2023/06/red-canary-coffee-talk-managed-detection-and-response.aspx?tc=page0</id>
    <title type="html">Coffee Talk: Managed Detection &amp;amp; Response: What IT Leaders Need to Know</title>
    <link href="https://redmondmag.com/webcasts/2023/06/red-canary-coffee-talk-managed-detection-and-response.aspx?tc=page0" rel="alternate" />
    <updated>2023-05-19T16:52:04.000-05:00</updated>
    <published>2023-05-19T16:52:04.000-05:00</published>
    <summary>Managed Detection and Response services are the next level and perhaps even the apex of endpoint and network security with the goal of containing and eradicating a contagion before the damage is done. Join Cyjax’s CISO Ian Thornton-Trump CD who will address the key challenges of deployment, operation, and extension of MDR capabilities to remote endpoints in this rapid-fire Coffee Talk.</summary>
    <content type="html">
        <![CDATA[Managed Detection and Response services are the next level and perhaps even the apex of endpoint and network security with the goal of containing and eradicating a contagion before the damage is done. Join Cyjax’s CISO Ian Thornton-Trump CD who will address the key challenges of deployment, operation, and extension of MDR capabilities to remote endpoints in this rapid-fire Coffee Talk.]]>
    </content>
                <source>
                    <id>http://redmondmag.com/rss-feeds/webcasts.aspx</id>
                            <title>Redmond Webcasts</title>
                </source>
    </entry>
        <entry>
    <id>https://redmondmag.com/webcasts/2023/06/veeam-cloud-power-hour-veeam-backup-for-google-cloud.aspx?tc=page0</id>
    <title type="html">Cloud Power Hour: Veeam Backup for Google Cloud to Power Your Cloud Journey</title>
    <link href="https://redmondmag.com/webcasts/2023/06/veeam-cloud-power-hour-veeam-backup-for-google-cloud.aspx?tc=page0" rel="alternate" />
    <updated>2023-05-19T16:52:03.000-05:00</updated>
    <published>2023-05-19T16:52:03.000-05:00</published>
    <summary>Join this session to learn about Veeam Backup for Google Cloud, designed to protect cloud-hosted workloads such as compute, databases, and file shares. The new v4 release offers numerous additional features to power up your cloud journey. Reserve your spot today!</summary>
    <content type="html">
        <![CDATA[Join this session to learn about Veeam Backup for Google Cloud, designed to protect cloud-hosted workloads such as compute, databases, and file shares. The new v4 release offers numerous additional features to power up your cloud journey. Reserve your spot today!]]>
    </content>
                <source>
                    <id>http://redmondmag.com/rss-feeds/webcasts.aspx</id>
                            <title>Redmond Webcasts</title>
                </source>
    </entry>
        <entry>
    <id>https://www.darkreading.com/application-security/apple-patches-3-zero-days-possibly-already-exploited</id>
    <title type="html">Apple Patches 3 Zero-Days Possibly Already Exploited</title>
    <link href="https://www.darkreading.com/application-security/apple-patches-3-zero-days-possibly-already-exploited" rel="alternate" />
    <updated>2023-05-19T15:04:00.000-05:00</updated>
    <published>2023-05-19T15:04:00.000-05:00</published>
    <summary>In an advisory released by the company, Apple revealed patches for three previously unknown bugs it says may already have been used by attackers.</summary>
    <content type="html">
        <![CDATA[In an advisory released by the company, Apple revealed patches for three previously unknown bugs it  says may already have been used by attackers.]]>
    </content>
            <author>
            <name>Dark Reading Staff, Dark Reading</name>
                                </author>
                <source>
                    <id>http://www.darkreading.com/rss_simple.asp</id>
                            <title>Dark Reading</title>
                </source>
    </entry>
        <entry>
    <id>https://www.darkreading.com/edge-articles/data-siloes-overcoming-the-greatest-challenge-in-secops</id>
    <title type="html">Data Siloes: Overcoming the Greatest Challenge in SecOps</title>
    <link href="https://www.darkreading.com/edge-articles/data-siloes-overcoming-the-greatest-challenge-in-secops" rel="alternate" />
    <updated>2023-05-19T14:38:00.000-05:00</updated>
    <published>2023-05-19T14:38:00.000-05:00</published>
    <summary>It&#039;s not lack of data that&#039;s the problem, but the inability to piece it together to truly understand and reduce risk.</summary>
    <content type="html">
        <![CDATA[It's not lack of data that's the problem, but the inability to piece it together to truly understand and reduce risk.]]>
    </content>
            <author>
            <name>Allen Rogers, Co-founder &amp;amp; Chief Product Officer, Noetic Cyber</name>
                                </author>
                <source>
                    <id>http://www.darkreading.com/rss_simple.asp</id>
                            <title>Dark Reading</title>
                </source>
    </entry>
        <entry>
    <id>https://www.darkreading.com/threat-intelligence/three-common-initial-attack-vectors-account-for-most-ransomware-campaigns</id>
    <title type="html">3 Common Initial Attack Vectors Account for Most Ransomware Campaigns</title>
    <link href="https://www.darkreading.com/threat-intelligence/three-common-initial-attack-vectors-account-for-most-ransomware-campaigns" rel="alternate" />
    <updated>2023-05-19T14:00:01.000-05:00</updated>
    <published>2023-05-19T14:00:01.000-05:00</published>
    <summary>The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.</summary>
    <content type="html">
        <![CDATA[The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.]]>
    </content>
            <author>
            <name>Robert Lemos, Contributing Writer, Dark Reading</name>
                                </author>
                <source>
                    <id>http://www.darkreading.com/rss_simple.asp</id>
                            <title>Dark Reading</title>
                </source>
    </entry>
        <entry>
    <id>https://www.darkreading.com/endpoint/keep-your-friends-close-and-your-identity-closer</id>
    <title type="html">Keep Your Friends Close and Your Identity Closer</title>
    <link href="https://www.darkreading.com/endpoint/keep-your-friends-close-and-your-identity-closer" rel="alternate" />
    <updated>2023-05-19T09:00:00.000-05:00</updated>
    <published>2023-05-19T09:00:00.000-05:00</published>
    <summary>As we share an increasing amount of personal information online, we create more opportunities for threat actors to steal our identities.</summary>
    <content type="html">
        <![CDATA[As we share an increasing amount of personal information online, we create more opportunities for threat actors to steal our identities.]]>
    </content>
            <author>
            <name>Sameer Hajarnis, Chief Product Officer, OneSpan</name>
                                </author>
                <source>
                    <id>http://www.darkreading.com/rss_simple.asp</id>
                            <title>Dark Reading</title>
                </source>
    </entry>
        <entry>
    <id>https://www.darkreading.com/vulnerabilities-threats/google-debuts-quality-ratings-for-security-bug-disclosures</id>
    <title type="html">Google Debuts Quality Ratings for Security Bug Disclosures</title>
    <link href="https://www.darkreading.com/vulnerabilities-threats/google-debuts-quality-ratings-for-security-bug-disclosures" rel="alternate" />
    <updated>2023-05-19T08:05:00.000-05:00</updated>
    <published>2023-05-19T08:05:00.000-05:00</published>
    <summary>New rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.</summary>
    <content type="html">
        <![CDATA[New rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program. ]]>
    </content>
            <author>
            <name>Becky Bracken, Editor, Dark Reading</name>
                                </author>
                <source>
                    <id>http://www.darkreading.com/rss_simple.asp</id>
                            <title>Dark Reading</title>
                </source>
    </entry>
        <entry>
    <id>https://thehackernews.com/2023/05/privacy-sandbox-initiative-google-to.html</id>
    <title type="html">Privacy Sandbox Initiative: Google to Phase Out Third-Party Cookies Starting 2024</title>
    <link href="https://thehackernews.com/2023/05/privacy-sandbox-initiative-google-to.html" rel="alternate" />
    <updated>2023-05-19T07:28:00.000-05:00</updated>
    <published>2023-05-19T07:28:00.000-05:00</published>
    <summary>Google has announced plans to officially flip the switch on its twice-delayed Privacy Sandbox initiatives as it slowly works its way to deprecate support for third-party cookies in Chrome browser.
To that end, the search and advertising giant said it intends to phase out third-party cookies for 1% of Chrome users globally in the first quarter of 2024.
&quot;This will support developers in conducting</summary>
    <content type="html">
        <![CDATA[Google has announced plans to officially flip the switch on its twice-delayed Privacy Sandbox initiatives as it slowly works its way to deprecate support for third-party cookies in Chrome browser.
To that end, the search and advertising giant said it intends to phase out third-party cookies for 1% of Chrome users globally in the first quarter of 2024.
"This will support developers in conducting]]>
    </content>
                <source>
                    <id>http://thehackernews.com/feeds/posts/default</id>
                            <title>The Hacker News</title>
                </source>
    </entry>
        <entry>
    <id>https://thehackernews.com/2023/05/dr-active-directory-vs-mr-exposed.html</id>
    <title type="html">Dr. Active Directory vs. Mr. Exposed Attack Surface: Who&amp;#039;ll Win This Fight?</title>
    <link href="https://thehackernews.com/2023/05/dr-active-directory-vs-mr-exposed.html" rel="alternate" />
    <updated>2023-05-19T06:04:00.000-05:00</updated>
    <published>2023-05-19T06:04:00.000-05:00</published>
    <summary>Active Directory (AD) is among the oldest pieces of software still used in the production environment and can be found in most organizations today. This is despite the fact that its historical security gaps have never been amended. For example, because of its inability to apply any security measures beyond checking for a password and username match, AD (as well the resources it manages) is</summary>
    <content type="html">
        <![CDATA[Active Directory (AD) is among the oldest pieces of software still used in the production environment and can be found in most organizations today. This is despite the fact that its historical security gaps have never been amended. For example, because of its inability to apply any security measures beyond checking for a password and username match, AD (as well the resources it manages) is]]>
    </content>
                <source>
                    <id>http://thehackernews.com/feeds/posts/default</id>
                            <title>The Hacker News</title>
                </source>
    </entry>
        <entry>
    <id>https://thehackernews.com/2023/05/developer-alert-npm-packages-for-nodejs.html</id>
    <title type="html">Developer Alert: NPM Packages for Node.js Hiding Dangerous TurkoRat Malware</title>
    <link href="https://thehackernews.com/2023/05/developer-alert-npm-packages-for-nodejs.html" rel="alternate" />
    <updated>2023-05-19T05:40:00.000-05:00</updated>
    <published>2023-05-19T05:40:00.000-05:00</published>
    <summary>Two malicious packages discovered in the npm package repository have been found to conceal an open source information stealer malware called TurkoRat.
The packages – named nodejs-encrypt-agent and nodejs-cookie-proxy-agent – were collectively downloaded approximately 1,200 times and were available for more than two months before they were identified and taken down.
ReversingLabs, which broke</summary>
    <content type="html">
        <![CDATA[Two malicious packages discovered in the npm package repository have been found to conceal an open source information stealer malware called TurkoRat.
The packages – named nodejs-encrypt-agent and nodejs-cookie-proxy-agent – were collectively downloaded approximately 1,200 times and were available for more than two months before they were identified and taken down.
ReversingLabs, which broke]]>
    </content>
                <source>
                    <id>http://thehackernews.com/feeds/posts/default</id>
                            <title>The Hacker News</title>
                </source>
    </entry>
        <entry>
    <id>https://thehackernews.com/2023/05/searching-for-ai-tools-watch-out-for.html</id>
    <title type="html">Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware</title>
    <link href="https://thehackernews.com/2023/05/searching-for-ai-tools-watch-out-for.html" rel="alternate" />
    <updated>2023-05-19T01:53:00.000-05:00</updated>
    <published>2023-05-19T01:53:00.000-05:00</published>
    <summary>Malicious Google Search ads for generative AI services like OpenAI ChatGPT and Midjourney are being used to direct users to sketchy websites as part of a BATLOADER campaign designed to deliver RedLine Stealer malware.
&quot;Both AI services are extremely popular but lack first-party standalone apps (i.e., users interface with ChatGPT via their web interface while Midjourney uses Discord),&quot; eSentire</summary>
    <content type="html">
        <![CDATA[Malicious Google Search ads for generative AI services like OpenAI ChatGPT and Midjourney are being used to direct users to sketchy websites as part of a BATLOADER campaign designed to deliver RedLine Stealer malware.
"Both AI services are extremely popular but lack first-party standalone apps (i.e., users interface with ChatGPT via their web interface while Midjourney uses Discord)," eSentire]]>
    </content>
                <source>
                    <id>http://thehackernews.com/feeds/posts/default</id>
                            <title>The Hacker News</title>
                </source>
    </entry>
        <entry>
    <id>https://thehackernews.com/2023/05/webkit-under-attack-apple-issues.html</id>
    <title type="html">WebKit Under Attack: Apple Issues Emergency Patches for 3 New Zero-Day Vulnerabilities</title>
    <link href="https://thehackernews.com/2023/05/webkit-under-attack-apple-issues.html" rel="alternate" />
    <updated>2023-05-18T22:43:00.000-05:00</updated>
    <published>2023-05-18T22:43:00.000-05:00</published>
    <summary>Apple on Thursday rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and the Safari web browser to address three new zero-day flaws that it said are being actively exploited in the wild.
The three security shortcomings are listed below -

CVE-2023-32409 - A WebKit flaw that could be exploited by a malicious actor to break out of the Web Content sandbox. It was addressed with</summary>
    <content type="html">
        <![CDATA[Apple on Thursday rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and the Safari web browser to address three new zero-day flaws that it said are being actively exploited in the wild.
The three security shortcomings are listed below -

CVE-2023-32409 - A WebKit flaw that could be exploited by a malicious actor to break out of the Web Content sandbox. It was addressed with]]>
    </content>
                <source>
                    <id>http://thehackernews.com/feeds/posts/default</id>
                            <title>The Hacker News</title>
                </source>
    </entry>
        <entry>
    <id>https://nakedsecurity.sophos.com/2023/05/19/apples-secret-is-out-3-zero-days-fixed-so-be-sure-to-patch-now/</id>
    <title type="html">Apple’s secret is out: 3 zero-days fixed, so be sure to patch now!</title>
    <link href="https://nakedsecurity.sophos.com/2023/05/19/apples-secret-is-out-3-zero-days-fixed-so-be-sure-to-patch-now/" rel="alternate" />
    <updated>2023-05-18T20:02:03.000-05:00</updated>
    <published>2023-05-18T20:02:03.000-05:00</published>
    <summary>All Apple users have zero-days that need patching, though some have more zero-days than others.</summary>
    <content type="html">
        <![CDATA[All Apple users have zero-days that need patching, though some have more zero-days than others.]]>
    </content>
            <author>
            <name>Paul Ducklin</name>
                                </author>
                <source>
                    <id>https://nakedsecurity.sophos.com/feed/</id>
                            <title>Naked Security</title>
                </source>
    </entry>
        <entry>
    <id>https://nakedsecurity.sophos.com/2023/05/18/s3-ep135-sysadmin-by-day-extortionist-by-night/</id>
    <title type="html">S3 Ep135: Sysadmin by day, extortionist by night</title>
    <link href="https://nakedsecurity.sophos.com/2023/05/18/s3-ep135-sysadmin-by-day-extortionist-by-night/" rel="alternate" />
    <updated>2023-05-18T13:48:49.000-05:00</updated>
    <published>2023-05-18T13:48:49.000-05:00</published>
    <summary>Laugh (sufficiently), learn (efficiently), and then let us know what you think in our comments (anonymously, if you wish)...</summary>
    <content type="html">
        <![CDATA[Laugh (sufficiently), learn (efficiently), and then let us know what you think in our comments (anonymously, if you wish)...]]>
    </content>
            <author>
            <name>Paul Ducklin</name>
                                </author>
                <source>
                    <id>https://nakedsecurity.sophos.com/feed/</id>
                            <title>Naked Security</title>
                </source>
    </entry>
        <entry>
    <id>https://nakedsecurity.sophos.com/2023/05/17/us-offers-10m-bounty-for-russian-ransomware-suspect-outed-in-indictment/</id>
    <title type="html">US offers $10m bounty for Russian ransomware suspect outed in indictment</title>
    <link href="https://nakedsecurity.sophos.com/2023/05/17/us-offers-10m-bounty-for-russian-ransomware-suspect-outed-in-indictment/" rel="alternate" />
    <updated>2023-05-17T13:40:11.000-05:00</updated>
    <published>2023-05-17T13:40:11.000-05:00</published>
    <summary>&quot;Up to $10 million for information that leads to the arrest and/or conviction of this defendant.&quot;</summary>
    <content type="html">
        <![CDATA["Up to $10 million for information that leads to the arrest and/or conviction of this defendant."]]>
    </content>
            <author>
            <name>Naked Security writer</name>
                                </author>
                <source>
                    <id>https://nakedsecurity.sophos.com/feed/</id>
                            <title>Naked Security</title>
                </source>
    </entry>
        <entry>
    <id>https://risky.biz/RB706</id>
    <title type="html">Risky Business #706 -- Why BlackBerry thinks Cuba ransomware is a Russian front</title>
    <link href="https://risky.biz/RB706" rel="alternate" />
    <updated>2023-05-16T19:00:00.000-05:00</updated>
    <published>2023-05-16T19:00:00.000-05:00</published>
    <summary>On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:


 Wazawaka charged, sanctioned
 PlugwalkJoe extradited, pleads guilty
 BlackBerry thinks Cuba ransomware is a front for Russian intelligence
 Anonymous Sudan pops up in Israel
 Microsoft’s Outlook patch fail
 Much, much more


This week’s show is brought to you by Bloodhound Enterprise. Andy Robbins is this week’s sponsor guest. He talks about how graph theory could help us to uncover more lolbins.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

        
        
        
          
            Show notes
          
          
            
            
             Alleged Babuk ransomware gang leader ‘Wazawaka’ indicted, sanctioned by US
             Who is the Network Access Broker ‘Wazawaka?’ – Krebs on Security
             British man involved in Twitter hack extradited to US, pleads guilty to numerous cybercrimes
             Cybercriminals who targeted Ukraine are actually Russian government hackers, researchers say | TechCrunch
             Slapdash attempt to hack rocket sirens may be cause for serious alarm about Iran | The Times of Israel
             Twitter’s Encrypted DMs Are Deeply Inferior to Signal and WhatsApp | WIRED
             Twitter under fire for restricting content before Turkish presidential election - CBS News
             Three opposition media outlets hit by cyber attack
             Patrick Gray on Twitter: &quot;https://t.co/n5b7wPjI6Y https://t.co/UmDbHbhEcS&quot; / Twitter
             (1) Patrick Gray on Twitter: &quot;Switched to a domain validated username at the other place. Very easy. https://t.co/U46zABPnJl&quot; / Twitter
             Emerging ransomware group quickly hits 4 critical infrastructure providers | Cybersecurity Dive
             A ransomware source code leak spawned at least 10 ‘Babuk’ imitators, researchers say
             Philadelphia Inquirer unable to go to print due to ‘cyber incident’
             Hackers attempt to extort Dragos and its executives in suspected ransomware attempt | CyberScoop
             Dallas says it &amp;#39;will likely take weeks to get back to full functionality&amp;#39; after ransomware attack
             Swiss tech giant ABB confirms ‘IT security incident’
             CISA: Bl00dy Ransomware Gang using printer vulnerability to attack schools
             Capita says responding to ransomware attack will cost up to £20 million
             National Gallery of Canada recovering from ransomware incident
             Yum Brands faces class action suits from employees after ransomware attack | Cybersecurity Dive
             Knocking down Hive: How the FBI ran its own ransomware decryption operation
             Leak of MSI UEFI signing keys stokes fears of “doomsday” supply chain attack | Ars Technica
             FBI nukes Russian Snake data theft malware with self-destruct command
             The FBI’s New Malware Eradication Service Is on Thin Legal Ice
             Cisco warns of new ‘Greatness’ phishing-as-a-service tool seen in the wild
             VMware’s ‘target-rich environment’ is growing more volatile, CrowdStrike warns | Cybersecurity Dive
             UK&amp;#39;s National Crime Agency wins major legal challenge over Encrochat hack
             Inside the Italian Mafia’s Encrypted Phone of Choice
             Microsoft releases fix for patched Outlook issue exploited by Russian hackers
             Scammer Made Thousands Selling &amp;#39;Leaked&amp;#39; Frank Ocean Tracks That Were Fake, AI-Generated</summary>
    <content type="html">
        <![CDATA[
            	
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:</p>

<ul>
  <li>Wazawaka charged, sanctioned</li>
  <li>PlugwalkJoe extradited, pleads guilty</li>
  <li>BlackBerry thinks Cuba ransomware is a front for Russian intelligence</li>
  <li>Anonymous Sudan pops up in Israel</li>
  <li>Microsoft’s Outlook patch fail</li>
  <li>Much, much more</li>
</ul>

<p>This week’s show is brought to you by Bloodhound Enterprise. Andy Robbins is this week’s sponsor guest. He talks about how graph theory could help us to uncover more lolbins.</p>

<p>Links to everything that we discussed are below and you can follow <a href="https://infosec.exchange/@riskybusiness">Patrick</a> or <a href="https://infosec.exchange/@metlstorm">Adam</a> on Mastodon if that’s your thing.</p>

                
                
                <div class="panel panel-default">
                    <div class="panel-heading">
                        <h3 class="panel-title">Show notes</h3>
                    </div>
                    <div class="panel-body">
                        <ul>
                        
                          <li><a href="https://therecord.media/alleged-babuk-ransomware-leader-sanctioned-and-indicted-by-us">Alleged Babuk ransomware gang leader ‘Wazawaka’ indicted, sanctioned by US</a></li>
                          <li><a href="https://krebsonsecurity.com/2022/01/who-is-the-network-access-broker-wazawaka/">Who is the Network Access Broker ‘Wazawaka?’ – Krebs on Security</a></li>
                          <li><a href="https://therecord.media/twitter-hack-guilty-plea-sim-swapping-cyberstalking">British man involved in Twitter hack extradited to US, pleads guilty to numerous cybercrimes</a></li>
                          <li><a href="https://techcrunch.com/2023/05/15/cybercriminals-who-targeted-ukraine-are-actually-russian-government-hackers-researchers-say/">Cybercriminals who targeted Ukraine are actually Russian government hackers, researchers say | TechCrunch</a></li>
                          <li><a href="https://www.timesofisrael.com/slapdash-attempt-to-hack-rocket-sirens-may-be-cause-for-serious-alarm-about-iran/">Slapdash attempt to hack rocket sirens may be cause for serious alarm about Iran | The Times of Israel</a></li>
                          <li><a href="https://www.wired.com/story/twitter-encrypted-dm-signal-whatsapp/">Twitter’s Encrypted DMs Are Deeply Inferior to Signal and WhatsApp | WIRED</a></li>
                          <li><a href="https://www.cbsnews.com/news/twitter-censoring-content-recep-tayyip-erdogan-turkish-presidential-election/">Twitter under fire for restricting content before Turkish presidential election - CBS News</a></li>
                          <li><a href="https://www.duvarenglish.com/three-opposition-media-outlets-hit-by-cyber-attack-news-62414">Three opposition media outlets hit by cyber attack</a></li>
                          <li><a href="https://twitter.com/riskybusiness/status/1658225798082596876?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">Patrick Gray on Twitter: &quot;https://t.co/n5b7wPjI6Y https://t.co/UmDbHbhEcS&quot; / Twitter</a></li>
                          <li><a href="https://twitter.com/riskybusiness/status/1658325990844809216">(1) Patrick Gray on Twitter: &quot;Switched to a domain validated username at the other place. Very easy. https://t.co/U46zABPnJl&quot; / Twitter</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/ransomware-group-hits-critical-infrastructure/650285/">Emerging ransomware group quickly hits 4 critical infrastructure providers | Cybersecurity Dive</a></li>
                          <li><a href="https://therecord.media/babuk-source-code-leak-leads-to-new-ransomware-variants">A ransomware source code leak spawned at least 10 ‘Babuk’ imitators, researchers say</a></li>
                          <li><a href="https://therecord.media/philadelphia-inquirer-cyber-incident-newspaper">Philadelphia Inquirer unable to go to print due to ‘cyber incident’</a></li>
                          <li><a href="https://cyberscoop.com/dragos-cyberattack-ransomware/">Hackers attempt to extort Dragos and its executives in suspected ransomware attempt | CyberScoop</a></li>
                          <li><a href="https://therecord.media/dallas-ransomware-attack-will-take-weeks-to-recover">Dallas says it &#039;will likely take weeks to get back to full functionality&#039; after ransomware attack</a></li>
                          <li><a href="https://therecord.media/abb-confirms-it-security-incident">Swiss tech giant ABB confirms ‘IT security incident’</a></li>
                          <li><a href="https://therecord.media/cisa-warns-of-bl00dy-ransomware-gang-using-papercut-vulnerability">CISA: Bl00dy Ransomware Gang using printer vulnerability to attack schools</a></li>
                          <li><a href="https://therecord.media/capita-ransomware-incident-response-cost">Capita says responding to ransomware attack will cost up to £20 million</a></li>
                          <li><a href="https://therecord.media/national-gallery-canada-recovering-from-ransomware-attack">National Gallery of Canada recovering from ransomware incident</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/yum-brands-class-action-suits-employees-ransomware/650394/">Yum Brands faces class action suits from employees after ransomware attack | Cybersecurity Dive</a></li>
                          <li><a href="https://therecord.media/hive-ransomware-decryptors-fbi-bryan-smith-interview-click-here">Knocking down Hive: How the FBI ran its own ransomware decryption operation</a></li>
                          <li><a href="https://arstechnica.com/information-technology/2023/05/leak-of-msi-uefi-signing-keys-stokes-concerns-of-doomsday-supply-chain-attack/">Leak of MSI UEFI signing keys stokes fears of “doomsday” supply chain attack | Ars Technica</a></li>
                          <li><a href="https://www.bleepingcomputer.com/news/security/fbi-nukes-russian-snake-data-theft-malware-with-self-destruct-command/">FBI nukes Russian Snake data theft malware with self-destruct command</a></li>
                          <li><a href="https://news.bloomberglaw.com/us-law-week/the-fbis-new-malware-eradication-service-is-on-thin-legal-ice">The FBI’s New Malware Eradication Service Is on Thin Legal Ice</a></li>
                          <li><a href="https://therecord.media/phishing-as-a-service-tool-greatness-used-by-hackers-cisco">Cisco warns of new ‘Greatness’ phishing-as-a-service tool seen in the wild</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/vmware-target-rich-environment-ransomware/650388/">VMware’s ‘target-rich environment’ is growing more volatile, CrowdStrike warns | Cybersecurity Dive</a></li>
                          <li><a href="https://therecord.media/nca-wins-encrochat-case-hacked-messaging-platform">UK&#039;s National Crime Agency wins major legal challenge over Encrochat hack</a></li>
                          <li><a href="https://www.vice.com/en/article/88xgjz/inside-italian-mafias-encrypted-phone-no1bc">Inside the Italian Mafia’s Encrypted Phone of Choice</a></li>
                          <li><a href="https://therecord.media/microsoft-releases-fix-for-patched-outlook-bug-russian-hackers">Microsoft releases fix for patched Outlook issue exploited by Russian hackers</a></li>
                          <li><a href="https://www.vice.com/en/article/z3mn75/scammer-made-thousands-selling-leaked-frank-ocean-tracks-that-were-fake-ai-generated-the-line-steer-it">Scammer Made Thousands Selling &#039;Leaked&#039; Frank Ocean Tracks That Were Fake, AI-Generated</a></li>
                        </ul>
                    </div>
                </div>
                
                
            ]]>
    </content>
            <author>
            <name>Patrick Gray</name>
                                </author>
                <source>
                    <id>http://risky.biz/feeds/risky-business</id>
                            <title>Risky Business</title>
                </source>
    </entry>
        <entry>
    <id>https://krebsonsecurity.com/2023/05/russian-hacker-wazawaka-indicted-for-ransomware/</id>
    <title type="html">Russian Hacker “Wazawaka” Indicted for Ransomware</title>
    <link href="https://krebsonsecurity.com/2023/05/russian-hacker-wazawaka-indicted-for-ransomware/" rel="alternate" />
    <updated>2023-05-16T16:33:43.000-05:00</updated>
    <published>2023-05-16T16:33:43.000-05:00</published>
    <summary>A Russian man identified by KrebsOnSecurity in January 2022 as a prolific and vocal member of several top ransomware groups was the subject of two indictments unsealed by the Justice Department today. U.S. prosecutors say Mikhail Pavolovich Matveev, a.k.a. &quot;Wazawaka&quot; and &quot;Boriselcin&quot; worked with three different ransomware gangs that extorted hundreds of millions of dollars from companies, schools, hospitals and government agencies.</summary>
    <content type="html">
        <![CDATA[<p>A Russian man identified by KrebsOnSecurity in January 2022 as a prolific and vocal member of several top ransomware groups was the subject of two indictments unsealed by the <strong>Justice Department</strong> today. U.S. prosecutors say <strong>Mikhail Pavolovich Matveev</strong>, a.k.a. &#8220;<strong>Wazawaka</strong>&#8221; and &#8220;<strong>Boriselcin</strong>&#8221; worked with three different ransomware gangs that extorted hundreds of millions of dollars from companies, schools, hospitals and government agencies.</p>
<div id="attachment_63686" style="width: 760px" class="wp-caption aligncenter"><a href="https://krebsonsecurity.com/wp-content/uploads/2023/05/fbiwanted-matveev.png" target="_blank" rel="noopener"><img aria-describedby="caption-attachment-63686" class="wp-image-63686" src="https://krebsonsecurity.com/wp-content/uploads/2023/05/fbiwanted-matveev.png" alt="" width="750" height="736" //></a><p id="caption-attachment-63686" class="wp-caption-text">An FBI wanted poster for Matveev.</p></div>
<p>Indictments returned in New Jersey and the District of Columbia allege that Matveev was involved in a conspiracy to distribute ransomware from three different strains or affiliate groups, including <strong>Babuk</strong>, <strong>Hive</strong> and <strong>LockBit</strong>.</p>
<p>The indictments allege that on June 25, 2020, Matveev and his LockBit co-conspirators deployed LockBit ransomware against a law enforcement agency in Passaic County, New Jersey. Prosecutors say that on May 27, 2022, Matveev conspired with Hive to ransom a nonprofit behavioral healthcare organization headquartered in Mercer County, New Jersey. And on April 26, 2021, Matveev and his Babuk gang allegedly deployed ransomware against the Metropolitan Police Department in Washington, D.C.</p>
<p>Meanwhile, the <strong>U.S. Department of Treasury</strong> has <a href="https://ofac.treasury.gov/recent-actions/20230516" target="_blank" rel="noopener">added Matveev</a> to its list of persons with whom it is illegal to transact financially. Also, the <b>U.S. State Department</b><strong> </strong>is offering <a href="https://www.state.gov/the-department-of-state-announces-reward-offer-against-russian-ransomware-actor/" target="_blank" rel="noopener">a $10 million reward</a> for the capture and/or prosecution of Matveev, although he is unlikely to face either as long as he continues to reside in Russia.</p>
<p>In a January 2021 discussion on a top Russian cybercrime forum, Matveev&#8217;s alleged alter ego Wazawaka said he had no plans to leave the protection of &#8220;Mother Russia,&#8221; and that traveling abroad was not an option for him.</p>
<p>&#8220;Mother Russia will help you,&#8221; Wazawaka concluded. &#8220;Love your country, and you will always get away with everything.&#8221;</p>
<p>In January 2022, KrebsOnSecurity published <a href="https://krebsonsecurity.com/2022/01/who-is-the-network-access-broker-wazawaka/" target="_blank" rel="noopener">Who is the Network Access Broker &#8216;Wazawaka,&#8217;</a> which followed clues from Wazawaka&#8217;s many pseudonyms and contact details on the Russian-language cybercrime forums back to a 33-year-old Mikhail Matveev from Abaza, RU (the FBI <a href="https://www.fbi.gov/wanted/cyber/mikhail-pavlovich-matveev/@@download.pdf" target="_blank" rel="noopener">says</a> his date of birth is Aug. 17, 1992).</p>
<p>A month after that story ran, a man who appeared identical to the social media photos for Matveev began posting on Twitter <a href="https://krebsonsecurity.com/2022/02/wazawaka-goes-waka-waka/" target="_blank" rel="noopener">a series of bizarre selfie videos</a> in which he lashed out at security journalists and researchers (including this author), while using the same Twitter account to drop exploit code for a widely-used virtual private networking (VPN) appliance.</p>
<p>&#8220;Hello Brian Krebs! You did a really great job actually, really well, fucking great — it&#8217;s great that journalism works so well in the US,&#8221; Matveev said in one of the videos. &#8220;By the way, it is my voice in the background, I just love myself a lot.&#8221;</p>
<div style="text-align: center"></div>
<p>Prosecutors allege Matveev used a dizzying stream of monikers on the cybercrime forums, including &#8220;<strong>Boriselcin</strong>,&#8221; a talkative and brash personality who was simultaneously the public persona of Babuk, a ransomware affiliate program that surfaced on New Year’s Eve 2020.<span id="more-63682"></span></p>
<p>Previous reporting here revealed that Matveev&#8217;s alter egos included &#8220;<strong>Orange,</strong>&#8221; the founder of the <strong>RAMP</strong> ransomware forum. RAMP stands for &#8220;Ransom Anon Market Place, and analysts at the security firm Flashpoint say the forum was created &#8220;directly in response to several large Dark Web forums banning ransomware collectives on their site following <a href="https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/" target="_blank" rel="noopener">the Colonial Pipeline attack</a> by ransomware group ‘<a href="https://krebsonsecurity.com/?s=darkside" target="_blank" rel="noopener">DarkSide</a>.”</p>
<p>As noted in last year&#8217;s investigations into Matveev, his alleged cybercriminal handles all were driven by a uniquely communitarian view that when organizations being held for ransom decline to cooperate or pay up, any data stolen from the victim should be published on the Russian cybercrime forums for all to plunder — not privately sold to the highest bidder.</p>
<p>In thread after thread on the crime forum <strong>XSS</strong>, Matveev&#8217;s alleged alias “<strong>Uhodiransomwar</strong>” could be seen posting download links to databases from companies that have refused to negotiate after five days.</p>
<p>Matveev is charged with conspiring to transmit ransom demands, conspiring to damage protected computers, and intentionally damaging protected computers. If convicted, he faces more than 20 years in prison.</p>
<p>Further reading:</p>
<p><a href="https://krebsonsecurity.com/2022/01/who-is-the-network-access-broker-wazawaka/" target="_blank" rel="noopener">Who is the Network Access Broker &#8220;Wazawaka?&#8221;</a></p>
<p><a href="https://krebsonsecurity.com/2022/02/wazawaka-goes-waka-waka/" target="_blank" rel="noopener">Wazawaka Goes Waka Waka</a></p>
<p>The <a href="https://krebsonsecurity.com/wp-content/uploads/2023/05/Matveev.Indictment.pdf" target="_blank" rel="noopener">New Jersey indictment against Matveev</a> (PDF)</p>
<p>The <a href="https://www.justice.gov/usao-dc/press-release/file/1583786/download" target="_blank" rel="noopener">indictment from the U.S. attorney&#8217;s office in Washington, D.C.</a> (PDF)</p>
]]>
    </content>
            <author>
            <name>BrianKrebs</name>
                                </author>
                <source>
                    <id>http://krebsonsecurity.com/feed/</id>
                            <title>Krebs on Security</title>
                </source>
    </entry>
        <entry>
    <id>https://nakedsecurity.sophos.com/2023/05/16/belkin-wemo-smart-plug-v2-the-buffer-overflow-that-wont-be-patched/</id>
    <title type="html">Belkin Wemo Smart Plug V2 – the buffer overflow that won’t be patched</title>
    <link href="https://nakedsecurity.sophos.com/2023/05/16/belkin-wemo-smart-plug-v2-the-buffer-overflow-that-wont-be-patched/" rel="alternate" />
    <updated>2023-05-16T15:59:09.000-05:00</updated>
    <published>2023-05-16T15:59:09.000-05:00</published>
    <summary>Yes, it&#039;s a buffer overflow bug. No, it&#039;s not going get fixed.</summary>
    <content type="html">
        <![CDATA[Yes, it's a buffer overflow bug. No, it's not going get fixed.]]>
    </content>
            <author>
            <name>Paul Ducklin</name>
                                </author>
                <source>
                    <id>https://nakedsecurity.sophos.com/feed/</id>
                            <title>Naked Security</title>
                </source>
    </entry>
        <entry>
    <id>https://krebsonsecurity.com/2023/05/re-victimization-from-police-auctioned-cell-phones/</id>
    <title type="html">Re-Victimization from Police-Auctioned Cell Phones</title>
    <link href="https://krebsonsecurity.com/2023/05/re-victimization-from-police-auctioned-cell-phones/" rel="alternate" />
    <updated>2023-05-16T07:20:58.000-05:00</updated>
    <published>2023-05-16T07:20:58.000-05:00</published>
    <summary>Countless smartphones seized in arrests and searches by police forces across the United States are being auctioned online without first having the data on them erased, a practice that can lead to crime victims being re-victimized, a new study found. In response, the largest online marketplace for items seized in U.S. law enforcement investigations says it now ensures that all phones sold through its platform will be data-wiped prior to auction.</summary>
    <content type="html">
        <![CDATA[<p><img loading="lazy" src="https://krebsonsecurity.com/wp-content/uploads/2023/05/policephone.png" alt="" width="708" height="476" class="aligncenter size-full wp-image-63671" //></p>
<p>Countless smartphones seized in arrests and searches by police forces across the United States are being auctioned online without first having the data on them erased, a practice that can lead to crime victims being re-victimized, a new study found. In response, the largest online marketplace for items seized in U.S. law enforcement investigations says it now ensures that all phones sold through its platform will be data-wiped prior to auction.</p>
<p>Researchers at the <strong>University of Maryland</strong> last year purchased 228 smartphones sold &#8220;as-is&#8221; from <strong>PropertyRoom.com</strong>, which bills itself as the largest auction house for police departments in the United States. Of phones they won at auction (at an average of $18 per phone), the researchers found 49 had no PIN or passcode; they were able to guess an additional 11 of the PINs by using the top-40 most popular PIN or swipe patterns.</p>
<p>Phones may end up in police custody for any number of reasons &#8212; such as its owner was involved in identity theft &#8212; and in these cases the phone itself was used as a tool to commit the crime.</p>
<p>&#8220;We initially expected that police would never auction these phones, as they would enable the buyer to recommit the same crimes as the previous owner,&#8221; the researchers explained in a paper released this month. &#8220;Unfortunately, that expectation has proven false in practice.&#8221;</p>
<p>The researchers said while they could have employed more aggressive technological measures to work out more of the PINs for the remaining phones they bought, they concluded based on the sample that a great many of the devices they won at auction had probably not been data-wiped and were protected only by a PIN.</p>
<p>Beyond what you would expect from unwiped second hand phones &#8212; every text message, picture, email, browser history, location history, etc. &#8212; the 61 phones they were able to access also contained significant amounts of data pertaining to crime &#8212; including victims&#8217; data &#8212; the researchers found.</p>
<p>Some readers may be wondering at this point, &#8220;Why should we care about what happens to a criminal&#8217;s phone?&#8221; First off, it&#8217;s not entirely clear how these phones ended up for sale on PropertyRoom. </p>
<p>&#8220;Some folks are like, &#8216;Yeah, whatever, these are criminal phones,&#8217; but are they?&#8221; said <strong>Dave Levin</strong>, an assistant professor of computer science at University of Maryland. </p>
<p>&#8220;We started looking at state laws around what they&#8217;re supposed to do with lost or stolen property, and we found that most of it ends up going the same route as civil asset forfeiture,&#8221; Levin continued. &#8220;Meaning, if they can&#8217;t find out who owns something, it eventually becomes the property of the state and gets shipped out to these resellers.&#8221;</p>
<p>Also, the researchers found that many of the phones clearly had personal information on them regarding previous or intended targets of crime: A dozen of the phones had photographs of government-issued IDs. Three of those were on phones that apparently belonged to sex workers; their phones contained communications with clients.<span id="more-63660"></span></p>
<div id="attachment_63674" style="width: 518px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-63674" loading="lazy" src="https://krebsonsecurity.com/wp-content/uploads/2023/05/phonedatatypes.png" alt="" width="508" height="411" class="size-full wp-image-63674" //><p id="caption-attachment-63674" class="wp-caption-text">An overview of the phone functionality and data accessibility for phones purchased by the researchers.</p></div>
<p>One phone had full credit files for eight different people on it. On another device they found a screenshot including 11 stolen credit cards that were apparently purchased from an online carding shop. On yet another, the former owner had apparently been active in a Telegram group chat that sold tutorials on how to run identity theft scams.</p>
<p>The most interesting phone from the batches they bought at auction was one with a sticky note attached that included the device&#8217;s PIN and the notation &#8220;<strong>Gry Keyed</strong>,&#8221; no doubt a reference to the <strong>Graykey</strong> software that is often used by law enforcement agencies <a href="https://appleinsider.com/articles/21/06/22/iphone-hacking-tool-graykey-techniques-outlined-in-leaked-instructions" rel="noopener" target="_blank">to brute-force a mobile device PIN</a>.</p>
<p>&#8220;That one had the PIN on the back,&#8221; Levin said. &#8220;The message chain on that phone had 24 Experian and TransUnion credit histories&#8221;.</p>
<p>The University of Maryland team said they took care in their research not to further the victimization of people whose information was on the devices they purchased from PropertyRoom.com. That involved ensuring that none of the devices could connect to the Internet when powered on, and scanning all images on the devices against known hashes for child sexual abuse material. </p>
<p>It is common to find phones and other electronics for sale on auction platforms like eBay that have not been wiped of sensitive data, but in those cases eBay doesn&#8217;t possess the items being sold. In contrast, platforms like PropertyRoom obtain devices and resell them at auction directly.</p>
<p>PropertyRoom did not respond to multiple requests for comment. But the researchers said sometime in the past few months PropertyRoom began posting a notice stating that all mobile devices would be wiped of their data before being sold at auction. </p>
<p>&#8220;We informed them of our research in October 2022, and they responded that they would review our findings internally,&#8221; Levin said. &#8220;They stopped selling them for a while, but then it slowly came back, and then we made sure we won every auction. And all of the ones we got from that were indeed wiped, except there were four devices that had external SD [storage] cards in them that weren&#8217;t wiped.&#8221;</p>
<p>A copy of the University of Maryland study is <a href="https://krebsonsecurity.com/wp-content/uploads/2023/05/police-auction.pdf" rel="noopener" target="_blank">here</a> (PDF).</p>
]]>
    </content>
            <author>
            <name>BrianKrebs</name>
                                </author>
                <source>
                    <id>http://krebsonsecurity.com/feed/</id>
                            <title>Krebs on Security</title>
                </source>
    </entry>
        <entry>
    <id>https://nakedsecurity.sophos.com/2023/05/15/zut-alors-raclage-crapuleux-clearview-ai-in-20-more-trouble-in-france/</id>
    <title type="html">Zut alors! Raclage crapuleux! Clearview AI in 20% more trouble in France</title>
    <link href="https://nakedsecurity.sophos.com/2023/05/15/zut-alors-raclage-crapuleux-clearview-ai-in-20-more-trouble-in-france/" rel="alternate" />
    <updated>2023-05-15T13:36:46.000-05:00</updated>
    <published>2023-05-15T13:36:46.000-05:00</published>
    <summary>We asked you once, we told you twice, now we&#039;re ordering you for the third time...</summary>
    <content type="html">
        <![CDATA[We asked you once, we told you twice, now we're ordering you for the third time...]]>
    </content>
            <author>
            <name>Paul Ducklin</name>
                                </author>
                <source>
                    <id>https://nakedsecurity.sophos.com/feed/</id>
                            <title>Naked Security</title>
                </source>
    </entry>
        <entry>
    <id>https://redmondmag.com/webcasts/2023/07/mastering-zero-trust-summit-july-14.aspx?tc=page0</id>
    <title type="html">Mastering Zero Trust Summit</title>
    <link href="https://redmondmag.com/webcasts/2023/07/mastering-zero-trust-summit-july-14.aspx?tc=page0" rel="alternate" />
    <updated>2023-05-12T00:21:47.000-05:00</updated>
    <published>2023-05-12T00:21:47.000-05:00</published>
    <summary>Join the editors of Virtualization &amp; Cloud Review for this free, half-day virtual summit for IT leaders that will bring together independent experts who will help you through your zero-trust implementation. No matter where you are in your zero-trust journey, you don&#039;t want to miss this summit -- register today!</summary>
    <content type="html">
        <![CDATA[Join the editors of Virtualization &amp; Cloud Review for this free, half-day virtual summit for IT leaders that will bring together independent experts who will help you through your zero-trust implementation. No matter where you are in your zero-trust journey, you don't want to miss this summit -- register today!  ]]>
    </content>
                <source>
                    <id>http://redmondmag.com/rss-feeds/webcasts.aspx</id>
                            <title>Redmond Webcasts</title>
                </source>
    </entry>
        <entry>
    <id>https://redmondmag.com/webcasts/2023/06/top-ransomware-attacks-and-prevention-strategies-summit-june-16.aspx?tc=page0</id>
    <title type="html">Top Ransomware Attacks &amp;amp; Prevention Strategies Summit</title>
    <link href="https://redmondmag.com/webcasts/2023/06/top-ransomware-attacks-and-prevention-strategies-summit-june-16.aspx?tc=page0" rel="alternate" />
    <updated>2023-05-12T00:21:46.000-05:00</updated>
    <published>2023-05-12T00:21:46.000-05:00</published>
    <summary>Join the editors of Virtualization &amp; Cloud Review for this free half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Don&#039;t miss out!</summary>
    <content type="html">
        <![CDATA[Join the editors of Virtualization &amp; Cloud Review for this free half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Don't miss out!]]>
    </content>
                <source>
                    <id>http://redmondmag.com/rss-feeds/webcasts.aspx</id>
                            <title>Redmond Webcasts</title>
                </source>
    </entry>
        <entry>
    <id>https://krebsonsecurity.com/2023/05/microsoft-patch-tuesday-may-2023-edition/</id>
    <title type="html">Microsoft Patch Tuesday, May 2023 Edition</title>
    <link href="https://krebsonsecurity.com/2023/05/microsoft-patch-tuesday-may-2023-edition/" rel="alternate" />
    <updated>2023-05-09T20:19:58.000-05:00</updated>
    <published>2023-05-09T20:19:58.000-05:00</published>
    <summary>Microsoft today released software updates to fix at least four dozen security holes in its Windows operating systems and other software, including patches for two zero-day vulnerabilities that are already being exploited in active attacks.</summary>
    <content type="html">
        <![CDATA[<p><strong>Microsoft</strong> today released software updates to fix at least four dozen security holes in its<strong> Windows</strong> operating systems and other software, including patches for two zero-day vulnerabilities that are already being exploited in active attacks. </p>
<p><img src="https://krebsonsecurity.com/wp-content/uploads/2022/07/winupdatedate.png" alt="" width="923" height="611" class="aligncenter size-full wp-image-60331" //></p>
<p>First up in May&#8217;s zero-day flaws is <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336" rel="noopener" target="_blank">CVE-2023-29336</a>, which is an &#8220;elevation of privilege&#8221; weakness in Windows which has a low attack complexity, requires low privileges, and no user interaction. However, as the <strong>SANS Internet Storm Center</strong> <a href="https://isc.sans.edu/diary/Microsoft%20May%202023%20Patch%20Tuesday/29826" rel="noopener" target="_blank">points out</a>, the attack vector for this bug is local.</p>
<p>&#8220;Local Privilege escalation vulnerabilities are a key part of attackers’ objectives,&#8221; said <strong>Kevin Breen</strong>, director of cyber threat research at <strong>Immersive Labs</strong>. &#8220;Once they gain initial access they will seek administrative or SYSTEM-level permissions. This can allow the attacker to disable security tooling and deploy more attacker tools like Mimikatz that lets them move across the network and gain persistence.&#8221; </p>
<p>The zero-day patch that has received the most attention so far is <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932" rel="noopener" target="_blank">CVE-2023-24932</a>, which is a <strong>Secure Boot Security Feature Bypass</strong> flaw that is being actively exploited by &#8220;bootkit&#8221; malware known as &#8220;<a href="https://www.bleepingcomputer.com/news/security/blacklotus-bootkit-bypasses-uefi-secure-boot-on-patched-windows-11/" rel="noopener" target="_blank">BlackLotus</a>.&#8221; A bootkit is dangerous because it allows the attacker to load malicious software before the operating system even starts up.<span id="more-63652"></span></p>
<p>According to Microsoft&#8217;s advisory, an attacker would need physical access or administrative rights to a target device, and could then install an affected boot policy. Microsoft gives this flaw a CVSS score of just 6.7, rating it as &#8220;Important.&#8221;</p>
<p><strong>Adam Barnett</strong>, lead software engineer at <strong>Rapid7</strong>, said CVE-2023-24932 deserves a considerably higher threat score. </p>
<p>&#8220;Microsoft warns that an attacker who already has Administrator access to an unpatched asset could exploit CVE-2023-24932 without necessarily having physical access,&#8221; Barnett said. &#8220;Therefore, the relatively low CVSSv3 base score of 6.7 isn’t necessarily a reliable metric in this case.&#8221;</p>
<p>Barnett said Microsoft has provided <a href="https://www.microsoft.com/en-us/security/blog/2023/04/11/guidance-for-investigating-attacks-using-cve-2022-21894-the-blacklotus-campaign/" rel="noopener" target="_blank">a supplementary guidance article</a> specifically calling out the threat posed by BlackLotus malware, which loads ahead of the operating system on compromised assets, and provides attackers with an array of powerful evasion, persistence, and Command &#038; Control (C2) techniques, including deploying malicious kernel drivers, and disabling Microsoft Defender or Bitlocker. </p>
<p>&#8220;Administrators should be aware that additional actions are required beyond simply applying the patches,&#8221; Barnett advised. &#8220;The patch enables the configuration options necessary for protection, but administrators must apply changes to UEFI config after patching. The attack surface is not limited to physical assets, either; Windows assets running on some VMs, including Azure assets with Secure Boot enabled, also require these extra remediation steps for protection. Rapid7 has noted in the past that enabling Secure Boot is a foundational protection against driver-based attacks. Defenders ignore this vulnerability at their peril.&#8221;</p>
<p>In addition to the two zero-days fixed this month, Microsoft also patched five remote code execution (RCE) flaws in Windows, two of which have notably high CVSS scores. </p>
<p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24941" rel="noopener" target="_blank">CVE-2023-24941</a> affects the Windows Network File System, and can be exploited over the network by making an unauthenticated, specially crafted request. Microsoft&#8217;s advisory also includes mitigation advice. The CVSS for this vulnerability is 9.8 – the highest of all the flaws addressed this month.</p>
<p>Meanwhile, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28283" rel="noopener" target="_blank">CVE-2023-28283</a> is a critical bug in the Windows Lightweight Directory Access Protocol (LDAP) that allows an unauthenticated attacker to execute malicious code on the vulnerable device. The CVSS for this vulnerability is 8.1, but Microsoft says exploiting the flaw may be tricky and unreliable for attackers.</p>
<p>Another vulnerability patched this month that was disclosed publicly before today (but not yet seen exploited in the wild) is <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29325" rel="noopener" target="_blank">CVE-2023-29325</a>, a weakness in <strong>Microsoft Outlook</strong> and <strong>Explorer</strong> that can be exploited by attackers to remotely install malware. Microsoft says this vulnerability can be exploited merely by viewing a specially-crafted email in the Outlook Preview Pane.</p>
<p>&#8220;To help protect against this vulnerability, we recommend users read email messages in plain text format,&#8221; Microsoft&#8217;s writeup on CVE-2023-29325 advises.</p>
<p>&#8220;If an attacker were able to exploit this vulnerability, they would gain remote access to the victim&#8217;s account, where they could deploy additional malware,&#8221; Immersive&#8217;s Breen said. &#8220;This kind of exploit will be highly sought after by e-crime and ransomware groups where, if successfully weaponized, could be used to target hundreds of organizations with very little effort.&#8221; </p>
<p>For more details on the updates released today, check out roundups by <a href="https://www.action1.com/patch-tuesday-may-2023/?vyj" rel="noopener" target="_blank">Action1</a>, <a href="https://www.automox.com/blog/patch-tuesday-may-2023" rel="noopener" target="_blank">Automox</a> and <a href="https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2023/05/09/microsoft-patch-tuesday-may-2023-security-update-review" rel="noopener" target="_blank">Qualys</a>,  If today’s updates cause any stability or usability issues in Windows, <a href="https://www.askwoody.com" rel="noopener" target="_blank">AskWoody.com</a> will likely have the lowdown on that.</p>
<p>Please consider backing up your data and/or imaging your system before applying any updates. And feel free to sound off in the comments if you experience any problems as a result of these patches.</p>
]]>
    </content>
            <author>
            <name>BrianKrebs</name>
                                </author>
                <source>
                    <id>http://krebsonsecurity.com/feed/</id>
                            <title>Krebs on Security</title>
                </source>
    </entry>
        <entry>
    <id>https://risky.biz/RB705</id>
    <title type="html">Risky Business #705 -- USA&amp;#039;s Turla takedown marks a shift in tactics</title>
    <link href="https://risky.biz/RB705" rel="alternate" />
    <updated>2023-05-09T19:00:00.000-05:00</updated>
    <published>2023-05-09T19:00:00.000-05:00</published>
    <summary>On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:


 Joe Sullivan’s sentencing
 MSI key material leak
 Merck to be paid in NotPetya claim
 The FBI takes down Turla’s Snake malware operation
 Much, much more


This week’s show is brought to you by Gigamon. Chaim Mazal, Gigamon’s CSO, is this week’s sponsor guest. He’s talking about how the company’s gear is acting as a data source for network security products.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

        
        
        
          
            Show notes
          
          
            
            
             Former Uber CSO avoids prison time for ransomware coverup | Cybersecurity Dive
             Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders | Cybersecurity Dive
             Home / Twitter
             Hunting Russian Intelligence “Snake” Malware | CISA
             Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia’s Federal Security Service | OPA | Department of Justice
             Iranian state-sponsored hackers exploiting printer vulnerability
             Iran: Fake It Till You Make It - by Tom Uren
             Hacktivists Target Iran’s Foreign Ministry, Leak Trove Of Data
             New Cactus ransomware encrypts itself to evade antivirus
             White House considers ban on ransom payments, with caveats | Cybersecurity Dive
             Hamas armed wing announces suspension of bitcoin fundraising | Reuters
             FBI, Ukraine seize cryptocurrency exchanges for abetting cybercriminals
             Dallas still recovering from ransomware on eve of municipal election | Cybersecurity Dive
             Dallas restores core emergency dispatch systems | Cybersecurity Dive
             Hackers hijacked a university&amp;#39;s emergency system to threaten students and faculty
             Organizations slow to patch GoAnywhere MFT vulnerability even after Clop ransomware attacks
             $10M Is Yours If You Can Get This Guy to Leave Russia – Krebs on Security
             Coming to DEF CON 31: Hacking AI models | CyberScoop
             Google Is Rolling Out Passkeys, the Password-Killing Tech, to All Accounts | WIRED
             US Court Rules for Corellium in Apple Copyright Case
             SafeGraph Lands US Air Force Contract After Targeting Abortion Clinics | WIRED</summary>
    <content type="html">
        <![CDATA[
            	
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:</p>

<ul>
  <li>Joe Sullivan’s sentencing</li>
  <li>MSI key material leak</li>
  <li>Merck to be paid in NotPetya claim</li>
  <li>The FBI takes down Turla’s Snake malware operation</li>
  <li>Much, much more</li>
</ul>

<p>This week’s show is brought to you by Gigamon. Chaim Mazal, Gigamon’s CSO, is this week’s sponsor guest. He’s talking about how the company’s gear is acting as a data source for network security products.</p>

<p>Links to everything that we discussed are below and you can follow <a href="https://infosec.exchange/@riskybusiness">Patrick</a> or <a href="https://infosec.exchange/@metlstorm">Adam</a> on Mastodon if that’s your thing.</p>

                
                
                <div class="panel panel-default">
                    <div class="panel-heading">
                        <h3 class="panel-title">Show notes</h3>
                    </div>
                    <div class="panel-body">
                        <ul>
                        
                          <li><a href="https://www.cybersecuritydive.com/news/uber-cso-prison-ransomware/649561/">Former Uber CSO avoids prison time for ransomware coverup | Cybersecurity Dive</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/merck-cyber-upheld-notpetya/649317/">Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders | Cybersecurity Dive</a></li>
                          <li><a href="https://twitter.com/home">Home / Twitter</a></li>
                          <li><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a">Hunting Russian Intelligence “Snake” Malware | CISA</a></li>
                          <li><a href="https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-snake-malware-network-controlled">Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia’s Federal Security Service | OPA | Department of Justice</a></li>
                          <li><a href="https://therecord.media/iranian-state-sponsored-hackers-exploiting-printer-vulnerability">Iranian state-sponsored hackers exploiting printer vulnerability</a></li>
                          <li><a href="https://srslyriskybiz.substack.com/p/iran-fake-it-till-you-make-it">Iran: Fake It Till You Make It - by Tom Uren</a></li>
                          <li><a href="https://www.iranintl.com/en/202305079860">Hacktivists Target Iran’s Foreign Ministry, Leak Trove Of Data</a></li>
                          <li><a href="https://www.bleepingcomputer.com/news/security/new-cactus-ransomware-encrypts-itself-to-evade-antivirus/">New Cactus ransomware encrypts itself to evade antivirus</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/white-house-considers-ransom-payment-ban/649673/">White House considers ban on ransom payments, with caveats | Cybersecurity Dive</a></li>
                          <li><a href="https://www.reuters.com/world/middle-east/hamas-armed-wing-announces-suspension-bitcoin-fundraising-2023-04-28/">Hamas armed wing announces suspension of bitcoin fundraising | Reuters</a></li>
                          <li><a href="https://therecord.media/cryptocurrency-exchanges-seized-by-fbi-ukraine">FBI, Ukraine seize cryptocurrency exchanges for abetting cybercriminals</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/dallas-ransomware-recovery/649555/">Dallas still recovering from ransomware on eve of municipal election | Cybersecurity Dive</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/dallas-restores-emergency-dispatch/649789/">Dallas restores core emergency dispatch systems | Cybersecurity Dive</a></li>
                          <li><a href="https://www.nbcnews.com/tech/security/hackers-hijacked-universitys-emergency-system-threaten-students-facult-rcna82558">Hackers hijacked a university&#039;s emergency system to threaten students and faculty</a></li>
                          <li><a href="https://therecord.media/organizations-slow-to-patch-goanywhere-vulnerability-after-clop-attacks">Organizations slow to patch GoAnywhere MFT vulnerability even after Clop ransomware attacks</a></li>
                          <li><a href="https://krebsonsecurity.com/2023/05/10m-is-yours-if-you-can-get-this-guy-to-leave-russia/">$10M Is Yours If You Can Get This Guy to Leave Russia – Krebs on Security</a></li>
                          <li><a href="https://cyberscoop.com/def-con-red-teaming-ai/">Coming to DEF CON 31: Hacking AI models | CyberScoop</a></li>
                          <li><a href="https://www.wired.com/story/google-passkey-password-replacement/">Google Is Rolling Out Passkeys, the Password-Killing Tech, to All Accounts | WIRED</a></li>
                          <li><a href="https://www.bankinfosecurity.com/us-court-rules-for-corellium-in-apple-copyright-case-a-22017">US Court Rules for Corellium in Apple Copyright Case</a></li>
                          <li><a href="https://www.wired.com/story/safegraph-us-air-force-location-data/">SafeGraph Lands US Air Force Contract After Targeting Abortion Clinics | WIRED</a></li>
                        </ul>
                    </div>
                </div>
                
                
            ]]>
    </content>
            <author>
            <name>Patrick Gray</name>
                                </author>
                <source>
                    <id>http://risky.biz/feeds/risky-business</id>
                            <title>Risky Business</title>
                </source>
    </entry>
        <entry>
    <id>https://krebsonsecurity.com/2023/05/feds-take-down-13-more-ddos-for-hire-services/</id>
    <title type="html">Feds Take Down 13 More DDoS-for-Hire Services</title>
    <link href="https://krebsonsecurity.com/2023/05/feds-take-down-13-more-ddos-for-hire-services/" rel="alternate" />
    <updated>2023-05-09T09:05:44.000-05:00</updated>
    <published>2023-05-09T09:05:44.000-05:00</published>
    <summary>The U.S. Federal Bureau of Investigation (FBI) this week seized 13 domain names connected to “booter” services that let paying customers launch crippling distributed denial-of-service (DDoS) attacks. Ten of the domains are reincarnations of DDoS-for-hire services the FBI seized in December 2022, when it charged six U.S. men with computer crimes for allegedly operating booters.</summary>
    <content type="html">
        <![CDATA[<p><img loading="lazy" class="aligncenter wp-image-36825" src="https://krebsonsecurity.com/wp-content/uploads/2016/10/ddosbomb-580x357.png" alt="" width="749" height="461" //></p>
<p>The <strong>U.S. Federal Bureau of Investigation</strong> (FBI) this week seized 13 domain names connected to &#8220;<strong>booter</strong>&#8221; services that let paying customers launch crippling distributed denial-of-service (DDoS) attacks. Ten of the domains are reincarnations of DDoS-for-hire services the FBI seized in December 2022, when it charged six U.S. men with computer crimes for allegedly operating booters.</p>
<p>Booter services are advertised through a variety of methods, including Dark Web forums, chat platforms and even youtube.com. They accept payment via PayPal, Google Wallet, and/or cryptocurrencies, and subscriptions can range in price from just a few dollars to several hundred per month. The services are generally priced according to the volume of traffic to be hurled at the target, the duration of each attack, and the number of concurrent attacks allowed.</p>
<p>The websites that saw their homepages replaced with seizure notices from the FBI this week include booter services like <strong>cyberstress[.]org</strong> and <strong>exoticbooter[.]com</strong>, which the feds say were used to launch millions of attacks against millions of victims.</p>
<p>&#8220;School districts, universities, financial institutions and government websites are among the victims who have been targeted in attacks launched by booter services,&#8221; federal prosecutors in Los Angeles said in a statement.</p>
<p>Purveyors of booters or &#8220;stressers&#8221; claim they are not responsible for how customers use their services, and that they aren’t breaking the law because — like most security tools — these services can be used for good or bad purposes. Most booter sites employ wordy “terms of use” agreements that require customers to agree they will only stress-test their own networks — and that they won’t use the service to attack others.</p>
<p>But the DOJ says these disclaimers usually ignore the fact that most booter services are heavily reliant on constantly scanning the Internet to commandeer misconfigured devices that are critical for maximizing the size and impact of DDoS attacks. What&#8217;s more, none of the services seized by the government required users to demonstrate that they own the Internet addresses being stress-tested, something a legitimate testing service would insist upon.</p>
<p>This is the third in a series of U.S. and international law enforcement actions targeting booter services. In December 2022, the feds <a href="https://krebsonsecurity.com/2022/12/six-charged-in-mass-takedown-of-ddos-for-hire-sites/" target="_blank" rel="noopener">seized four-dozen booter domains and charged six U.S. men with computer crimes</a> related to their alleged ownership of the popular DDoS-for-hire services. In December 2018, the feds <a href="https://krebsonsecurity.com/2018/12/feds-charge-three-in-mass-seizure-of-attack-for-hire-services/" target="_blank" rel="noopener">targeted 15 booter sites, and three booter store defendants</a> who later pleaded guilty.</p>
<p>While the FBI&#8217;s repeated seizing of booter domains may seem like an endless game of virtual Whac-a-Mole, continuously taking these services offline imposes high enough costs for the operators that some of them will quit the business altogether, says <strong>Richard Clayton</strong>, director of <a href="https://www.cambridgecybercrime.uk/" target="_blank" rel="noopener">Cambridge University&#8217;s Cybercrime Centre</a>.</p>
<p>In 2020, Clayton and others published &#8220;<a href="https://krebsonsecurity.com/2020/05/career-choice-tip-cybercrime-is-mostly-boring" target="_blank" rel="noopener">Cybercrime is Mostly Boring</a>,&#8221; an academic study on the quality and types of work needed to build, maintain and defend illicit enterprises that make up a large portion of the cybercrime-as-a-service market. The study found that operating a booter service effectively requires a mind-numbing amount of constant, tedious work that tends to produce high burnout rates for booter service operators &#8212; even when the service is operating efficiently and profitably.</p>
<p>For example, running an effective booter service requires a substantial amount of administrative work and maintenance, much of which involves constantly scanning for, commandeering and managing large collections of remote systems that can be used to amplify online attacks, Clayton said. On top of that, building brand recognition and customer loyalty takes time.</p>
<p>&#8220;If you&#8217;re running a booter and someone keeps taking your domain or hosting away, you have to then go through doing the same boring work all over again,&#8221; Clayton told KrebsOnSecurity. &#8220;One of the guys the FBI arrested in December [2022] spent six months moaning that he lost his servers, and could people please lend him some money to get it started again.&#8221;<span id="more-63633"></span></p>
<p>In a statement released Wednesday, prosecutors in Los Angeles said four of the six men charged last year for running booter services have since pleaded guilty. However, at least one of the defendants from the 2022 booter bust-up &#8212; <strong>John M. Dobbs</strong>, 32, of Honolulu, HI &#8212; has pleaded not guilty and is signaling he intends to take his case to trial.</p>
<div id="attachment_63643" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-63643" loading="lazy" class="wp-image-63643" src="https://krebsonsecurity.com/wp-content/uploads/2023/05/seizepage.jpg" alt="" width="750" height="421" //><p id="caption-attachment-63643" class="wp-caption-text">The FBI seizure notice that replaced the homepages of several booter services this week.</p></div>
<p>Dobbs is a computer science graduate student who for the past decade openly ran <strong>IPStresser[.]com</strong>, a popular and powerful attack-for-hire service that he <a href="https://krebsonsecurity.com/2023/01/thinking-of-hiring-or-running-a-booter-service-think-again/" target="_blank" rel="noopener">registered with the state of Hawaii using his real name and address</a>. Likewise, the domain was registered in Dobbs’s name and hometown in Pennsylvania. Prosecutors say Dobbs&#8217; service attracted more than two million registered users, and was responsible for launching <em>a staggering 30 million distinct DDoS attacks</em>.</p>
<p>Many accused stresser site operators have pleaded guilty over the years after being hit with federal criminal charges. But the government’s core claim — that operating a booter site is a violation of U.S. computer crime laws — wasn’t properly tested in the courts until September 2021.</p>
<p><a href="https://krebsonsecurity.com/2018/12/feds-charge-three-in-mass-seizure-of-attack-for-hire-services/" target="_blank" rel="noopener">That was when a jury handed down </a><a href="https://krebsonsecurity.com/2021/09/trial-ends-in-guilty-verdict-for-ddos-for-hire-boss/" target="_blank" rel="noopener">a guilty verdict against <strong>Matthew Gatrel</strong></a>, a then 32-year-old St. Charles, Ill. man charged in the government’s first 2018 mass booter bust-up. Despite admitting to FBI agents that he ran two booter services (and turning over plenty of incriminating evidence in the process), Gatrel opted to take his case to trial, defended the entire time by court-appointed attorneys.</p>
<p>Gatrel was convicted on all three charges of violating the Computer Fraud and Abuse Act, including conspiracy to commit unauthorized impairment of a protected computer, conspiracy to commit wire fraud, and unauthorized impairment of a protected computer. He was sentenced to two years in prison.</p>
<p>A copy of the FBI&#8217;s booter seizure warrant is <a href="https://krebsonsecurity.com/wp-content/uploads/2023/05/Booter-seizure-warrant-Tucows.pdf" target="_blank" rel="noopener">here</a> (PDF). According to the DOJ, the defendants who pleaded guilty to operating booter sites include:</p>
<p>&#8211;<strong>Jeremiah Sam Evans Miller</strong>, aka &#8220;John The Dev,&#8221; 23, of San Antonio, Texas, who pleaded guilty on April 6 to conspiracy and violating the computer fraud and abuse act related to the operation of a booter service named RoyalStresser[.]com (formerly known as Supremesecurityteam[.]com);</p>
<p>&#8211;<strong>Angel Manuel Colon Jr.</strong>, aka &#8220;Anonghost720&#8221; and &#8220;Anonghost1337,&#8221; 37, of Belleview, Florida, who pleaded guilty on February 13 to conspiracy and violating the computer fraud and abuse act related to the operation of a booter service named SecurityTeam[.]io;</p>
<p>&#8211;<strong>Shamar Shattock</strong>, 19, of Margate, Florida, who pleaded guilty on March 22 to conspiracy to violate the computer fraud and abuse act related to the operation of a booter service known as Astrostress[.]com;</p>
<p>&#8211;<strong>Cory Anthony Palmer</strong>, 23, of Lauderhill, Florida, who pleaded guilty on February 16 to conspiracy to violate the computer fraud and abuse act related to the operation of a booter service known as Booter[.]sx.</p>
<p>All four defendants are scheduled to be sentenced this summer.</p>
<p>The <a href="https://krebsonsecurity.com/wp-content/uploads/2023/05/Booter_Seizure_List_May_2023.pdf" target="_blank" rel="noopener">booter domains</a> seized by the FBI this week include:</p>
<p>cyberstress[.]org<br //>
exoticbooter[.]com<br //>
layerstress[.]net<br //>
orbitalstress[.]xyz<br //>
redstresser[.]io<br //>
silentstress[.]wtf<br //>
sunstresser[.]net<br //>
silent[.]to<br //>
mythicalstress[.]net<br //>
dreams-stresser[.]org<br //>
stresserbest[.]io<br //>
stresserus[.]io<br //>
quantum-stress[.]org</p>
]]>
    </content>
            <author>
            <name>BrianKrebs</name>
                                </author>
                <source>
                    <id>http://krebsonsecurity.com/feed/</id>
                            <title>Krebs on Security</title>
                </source>
    </entry>
        <entry>
    <id>https://krebsonsecurity.com/2023/05/10m-is-yours-if-you-can-get-this-guy-to-leave-russia/</id>
    <title type="html">$10M Is Yours If You Can Get This Guy to Leave Russia</title>
    <link href="https://krebsonsecurity.com/2023/05/10m-is-yours-if-you-can-get-this-guy-to-leave-russia/" rel="alternate" />
    <updated>2023-05-04T20:50:08.000-05:00</updated>
    <published>2023-05-04T20:50:08.000-05:00</published>
    <summary>The U.S. government this week put a $10 million bounty on the head of a Russian man who for the past 18 years operated Try2Check, one of the cybercrime underground&#039;s most trusted services for checking the validity of stolen credit card data. U.S. authorities say 43-year-old Denis Kulkov&#039;s card-checking service made him at least $18 million, which he used to buy a Ferrari, Land Rover, and other luxury items.</summary>
    <content type="html">
        <![CDATA[<p>The U.S. government this week put a $10 million bounty on a Russian man who for the past 18 years operated <strong>Try2Check</strong>, one of the cybercrime underground&#8217;s most trusted services for checking the validity of stolen credit card data. U.S. authorities say 43-year-old <strong>Denis Kulkov</strong>&#8216;s card-checking service made him at least $18 million, which he used to buy a Ferrari, Land Rover, and other luxury items.</p>
<div id="attachment_63589" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-63589" loading="lazy" class=" wp-image-63589" src="https://krebsonsecurity.com/wp-content/uploads/2023/05/kulkov-ferrari.png" alt="" width="750" height="557" //><p id="caption-attachment-63589" class="wp-caption-text">Denis Kulkov, a.k.a. &#8220;Nordex,&#8221; in his Ferrari. Image: USDOJ.</p></div>
<p>Launched in 2005, Try2Check soon was processing more than a million card-checking transactions per month &#8212; charging 20 cents per transaction. Cybercriminals turned to services like this after purchasing stolen credit card data from an underground shop, with an eye toward minimizing the number of cards that are inactive by the time they are put to criminal use.</p>
<p>Try2Check was so reliable that it eventually became the official card-checking service for some of the underground&#8217;s most bustling crime bazaars, including Vault Market, <a href="https://krebsonsecurity.com/?s=unicc" target="_blank" rel="noopener">Unicc</a>, and <a href="https://krebsonsecurity.com/tag/jokers-stash/" target="_blank" rel="noopener">Joker&#8217;s Stash</a>. Customers of these carding shops who chose to use the shop&#8217;s built-in (but a-la-carte) card checking service from Try2Check could expect automatic refunds on any cards that were found to be inactive or canceled at the time of purchase.</p>
<p>Many established stolen card shops will allow customers to request refunds on dead cards based on official reports from trusted third-party checking services. But in general, the bigger shops have steered customers toward using their own white-labeled version of the Try2Check service &#8212; primarily to help minimize disputes over canceled cards.</p>
<p>On Wednesday, May 3, Try2Check&#8217;s websites were replaced with a domain seizure notice from the <strong>U.S. Secret Service</strong> and <strong>U.S. Department of Justice</strong>, as prosecutors in the <a href="https://www.justice.gov/usao-edny/pr/cybercriminal-network-fueling-global-stolen-credit-card-trade-dismantled" target="_blank" rel="noopener">Eastern District of New York</a> unsealed an indictment and search warrant naming <strong>Denis Gennadievich Kulkov</strong> of Samara, Russia as the proprietor.</p>
<div id="attachment_63600" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-63600" loading="lazy" class=" wp-image-63600" src="https://krebsonsecurity.com/wp-content/uploads/2023/05/try2seize.png" alt="" width="750" height="419" //><p id="caption-attachment-63600" class="wp-caption-text">Try2Check&#8217;s login pages have been replaced with a seizure notice from U.S. law enforcement.</p></div>
<p>At the same time, the <strong>U.S. Department of State</strong> <a href="http://state.gov/u-s-department-of-state-announces-reward-offers-for-information-leading-to-the-arrest-and-or-conviction-of-a-russian-cybercriminal-and-identification-of-key-leaders-of-a-transnational-organized-crime/" target="_blank" rel="noopener">issued a $10 million reward</a> for information leading to the arrest <em>or</em> conviction of Kulkov. In November 2021, the State Department began <a href="https://krebsonsecurity.com/2021/11/revil-ransom-arrest-6m-seizure-and-10m-reward/" target="_blank" rel="noopener">offering up to to $10 million</a> for the name or location of any key leaders of REvil, a major Russian ransomware gang.</p>
<p>As noted in the Secret Service&#8217;s <a href="https://krebsonsecurity.com/wp-content/uploads/2023/05/Cardcheckers-Complaint-FINAL.pdf" target="_blank" rel="noopener">criminal complaint</a> (PDF), the Try2Check service was first advertised on the closely-guarded Russian cybercrime forum <strong>Mazafaka</strong>, by someone using the handle &#8220;<strong>KreenJo</strong>.&#8221; That handle used the same ICQ instant messenger account number (<strong>555724</strong>) as a Mazafaka denizen named &#8220;<strong>Nordex</strong>.&#8221;</p>
<p>In February 2005, Nordex posted to Mazafaka that he was in the market for hacked bank accounts, and offered 50 percent of the take. He asked interested partners to contact him at the ICQ number <strong>228427661</strong> or at the email address <strong>polkas@bk.ru</strong>. As the government noted in its search warrant, Nordex exchanged messages with forum users at the time identifying himself as a then-24-year-old &#8220;Denis&#8221; from Samara, RU.</p>
<p>In 2017, U.S. law enforcement <a href="https://www.justice.gov/usao-sdny/pr/us-attorney-announces-historic-336-billion-cryptocurrency-seizure-and-conviction" target="_blank" rel="noopener">seized the cryptocurrency exchange BTC-e</a>, and the Secret Service said those records show that a Denis Kulkov from Samara supplied the username &#8220;<strong>Nordexin</strong>,&#8221; email address nordexin@ya.ru, and an address in Samara.</p>
<p>Investigators had already found Instagram accounts where Kulkov posted pictures of his Ferrari and his family. Authorities were able to identify that Kulkov had an <strong>iCloud</strong> account tied to the address <strong>nordexin@icloud.com</strong>, and upon subpoenaing that found passport photos of Kulkov, and well as more photos of his family and pricey cars.</p>
<p>Like many other top cybercriminals based in Russia or in countries with favorable relations to the Kremlin, the proprietor of Try2Check was not particularly difficult to link to a real-life identity. In Kulkov&#8217;s case, it no doubt was critical to U.S. investigators that they had access to a wealth of personal information tied to a cryptocurrency exchange Kulkov had used.</p>
<p>However, the link between Kulkov and Try2Check can be made &#8212; ironically &#8212; based on records that have been plundered by hackers and published online over the years &#8212; including Russian email services, Russian government records, and hacked cybercrime forums.<span id="more-63585"></span></p>
<h2>NORDEX</h2>
<div id="attachment_63591" style="width: 310px" class="wp-caption alignright"><img aria-describedby="caption-attachment-63591" loading="lazy" class=" wp-image-63591" src="https://krebsonsecurity.com/wp-content/uploads/2023/05/kulkovpassport.png" alt="" width="300" height="382" //><p id="caption-attachment-63591" class="wp-caption-text">Kulkov posing with his passport, in a photo authorities obtained by subpoenaing his iCloud account.</p></div>
<p>According to cybersecurity firm <a href="https://www.constellaintelligence.com" target="_blank" rel="noopener">Constella Intelligence</a>, the address polkas@bk.ru was used to register an account with the username &#8220;Nordex&#8221; at <a href="https://web.archive.org/web/20120228150736/http://bankir.ru/" target="_blank" rel="noopener"><strong>bankir[.]com</strong></a>, a now defunct news website that was almost standard reading for Russian speakers interested in news about various Russian financial markets.</p>
<p>Nordex appears to have been a finance nerd. In his early days on the forums, Nordex posted several long threads on his views about the Russian stock market and mutual fund investments.</p>
<p>That Bankir account was registered from the Internet address <strong>193.27.237.66</strong> in Samara, Russia, and included Nordex&#8217;s date of birth as <strong>April 8, 1980</strong>, as well as their ICQ number (<strong>228427661</strong>).</p>
<p>Cyber intelligence firm <a href="https://www.intel471.com" target="_blank" rel="noopener">Intel 471</a> found that Internet address also was used to register the account &#8220;Nordex&#8221; on the Russian hacking forum <strong>Exploit</strong> back in 2006.</p>
<p>Constella tracked another Bankir[.]com account created from that same Internet address under the username &#8220;Polkas.&#8221; This account had the same date of birth as Nordex, but a different email address: <strong>nordia@yandex.ru</strong>. This and other &#8220;nordia@&#8221; emails shared a password: &#8220;<strong>anna59</strong>.&#8221;</p>
<h2>NORDIA</h2>
<p>Nordia@yandex.ru shares several passwords with <strong>nordia@list.ru</strong>, which Constella says was used to create an account at a religious website for an <strong>Anna Kulikova</strong> from Samara. At the Russian home furnishing store Westwing.ru, Ms. Kulikova listed her full name as <strong>Anna Vnrhoturkina Kulikova</strong>, and her address as 29 Kommunistrecheskya St., Apt. 110.</p>
<p>A search on that address in Constella brings up a record for an <strong>Anna Denis Vnrhoturkina Kulkov</strong>, and the phone number <strong>879608229389</strong>.</p>
<p>Russian vehicle registration records have also been hacked and leaked online over the years. Those records show that Anna&#8217;s Apt 110 address is tied to a Denis Gennadyvich Kulkov, born April 8, 1980.</p>
<p>The vehicle Kolkov registered in 2015 at that address was a 2010 <strong>Ferrari Italia</strong>, with the license plate number <strong>K022YB190</strong>. The phone number associated with this record &#8212; <strong>79608229389</strong> &#8212; is exactly like Anna&#8217;s, only minus the (mis?)leading &#8220;8&#8221;. That number also is tied to a now-defunct Facebook account, and to the email addresses nordexin@ya.ru and nordexin@icloud.com.</p>
<p>Kulkov&#8217;s Ferrari has been photographed numerous times over the years by <a href="https://migalki.net/image.php?id=613020" target="_blank" rel="noopener">Russian car aficionados</a>, including this one with the driver&#8217;s face redacted by the photographer:</p>
<div id="attachment_63590" style="width: 761px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-63590" loading="lazy" class=" wp-image-63590" src="https://krebsonsecurity.com/wp-content/uploads/2023/05/kulkov-roadf.png" alt="" width="751" height="403" //><p id="caption-attachment-63590" class="wp-caption-text">The Ferrari owned by Denis Kulkov, spotted in Moscow in 2016. Image: Migalki.net.</p></div>
<p>As the title of this story suggests, the hard part for Western law enforcement isn&#8217;t identifying the Russian cybercriminals who are major players in the scene. Rather, it&#8217;s finding creative ways to capture high-value suspects if and when they do leave the protection that Russia generally extends to domestic cybercriminals within its borders who do not also harm Russian companies or consumers, or interfere with state interests.</p>
<p>But Russia&#8217;s war against Ukraine has caused major fault lines to appear in the cybercrime underground: Cybercriminal syndicates that previously straddled Russia and Ukraine with ease were forced to reevaluate many comrades who were suddenly working for The Other Side.</p>
<p>Many cybercriminals who operated with impunity from Russia and Ukraine prior to the war chose to flee those countries following the invasion, presenting international law enforcement agencies with rare opportunities to catch most-wanted cybercrooks. One of those was <strong>Mark Sokolovsky</strong>, a 26-year-old Ukrainian man who operated the popular “<strong>Raccoon</strong>” malware-as-a-service offering; Sokolovsky was <a href="https://krebsonsecurity.com/2022/10/accused-raccoon-malware-developer-fled-ukraine-after-russian-invasion/" target="_blank" rel="noopener">apprehended in March 2022 after fleeing Ukraine’s mandatory military service orders</a>.</p>
<p>Also nabbed on the lam last year was <strong>Vyacheslav “Tank” Penchukov</strong>, a senior Ukrainian member of a transnational cybercrime group that <a href="https://krebsonsecurity.com/2022/11/top-zeus-botnet-suspect-tank-arrested-in-geneva/" target="_blank" rel="noopener">stole tens of millions of dollars over nearly a decade from countless hacked businesses</a>. Penchukov was arrested after leaving Ukraine to meet up with his wife in Switzerland.</p>
]]>
    </content>
            <author>
            <name>BrianKrebs</name>
                                </author>
                <source>
                    <id>http://krebsonsecurity.com/feed/</id>
                            <title>Krebs on Security</title>
                </source>
    </entry>
        <entry>
    <id>https://risky.biz/snakeoilers17pt2</id>
    <title type="html">Snake Oilers: Resourcely, Panther and Island</title>
    <link href="https://risky.biz/snakeoilers17pt2" rel="alternate" />
    <updated>2023-05-03T19:00:00.000-05:00</updated>
    <published>2023-05-03T19:00:00.000-05:00</published>
    <summary>In this edition of Snake Oilers:


 Travis McPeak pitches Resourcely’s automagic Terraform cloud-provisioning technology
 Ken Westin pitches Panther – a cloud-native SIEM developed by former practitioners
 Brian Kenyon from Island talks about the company’s enterprise browser


Enjoy!

        
        
        
          
            Show notes
          
          
            
            
             Resourcely | Cloud resource creation and management
             Panther | A Cloud SIEM Platform for Modern Security Teams
             Island | The Enterprise Browser</summary>
    <content type="html">
        <![CDATA[
            	
                <p>In this edition of Snake Oilers:</p>

<ul>
  <li>Travis McPeak pitches <a href="https://resourcely.io">Resourcely’s</a> automagic Terraform cloud-provisioning technology</li>
  <li>Ken Westin pitches <a href="https://panther.io">Panther</a> – a cloud-native SIEM developed by former practitioners</li>
  <li>Brian Kenyon from <a href="https://island.io">Island</a> talks about the company’s enterprise browser</li>
</ul>

<p>Enjoy!</p>

                
                
                <div class="panel panel-default">
                    <div class="panel-heading">
                        <h3 class="panel-title">Show notes</h3>
                    </div>
                    <div class="panel-body">
                        <ul>
                        
                          <li><a href="https://www.resourcely.io/">Resourcely | Cloud resource creation and management</a></li>
                          <li><a href="https://panther.com/">Panther | A Cloud SIEM Platform for Modern Security Teams</a></li>
                          <li><a href="https://www.island.io/">Island | The Enterprise Browser</a></li>
                        </ul>
                    </div>
                </div>
                
                
            ]]>
    </content>
            <author>
            <name>Patrick Gray</name>
                                </author>
                <source>
                    <id>http://risky.biz/feeds/risky-business</id>
                            <title>Risky Business</title>
                </source>
    </entry>
        <entry>
    <id>https://risky.biz/RB704</id>
    <title type="html">Risky Business #704 -- Why LLMs aren&amp;#039;t an exploit bonanza</title>
    <link href="https://risky.biz/RB704" rel="alternate" />
    <updated>2023-05-02T19:00:00.000-05:00</updated>
    <published>2023-05-02T19:00:00.000-05:00</published>
    <summary>On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:


 Rob Joyce weighs in on AI and offsec
 Mysterious hacker doxes Russian intelligence agency bitcoin wallets
 Wired deep dives on SolarWinds
 AmeriCold food logistics giant suffers incident
 Iranian authorities roll low-tech spyware
 Much, much more


This week’s show is brought to you by Greynoise. Its founder and CEO Andrew Morris is this week’s sponsor guest.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

        
        
        
          
            Show notes
          
          
            
            
             NSA Cybersecurity Director Says ‘Buckle Up’ for Generative AI | WIRED
             3 areas of generative AI the NSA is watching in cybersecurity | Cybersecurity Dive
             NSA cyber director warns of ransomware attacks on Ukraine, Western supply chains
             Palantir Demos AI to Fight Wars But Says It Will Be Totally Ethical Don’t Worry About It
             (1) Alex Banks on Twitter: &quot;Yesterday Palantir announced its Artificial Intelligence Platform. Here&amp;#39;s how it transforms the future of military and defence: https://t.co/TcgN29wN19&quot; / Twitter
             Russian Bitcoin (BTC) Wallets Allegedly Exposed by Apparent Hacker
             DOJ Detected SolarWinds Breach Months Before Public Disclosure | WIRED
             SolarWinds: The Untold Story of the Boldest Supply-Chain Hack | WIRED
             Cold storage company Americold reports cyberattack to SEC
             CISA seeks public comment on software security attestation form | Cybersecurity Dive
             Secure Software Development Attestation Form Instructions
             DHS pushes Congress to formally establish Cyber Safety Review Board
             First draft of controversial UN Cybercrime Treaty slated for June
             Return of the EARN IT Act rekindles encryption debate at critical moment for privacy-protecting apps | CyberScoop
             Apple releases first ‘rapid’ security fixes for iPhones, iPads and Macs | TechCrunch
             BouldSpy: Android Spyware Tied to Iranian Police Targets Minorities | Lookout
             Evasive Panda APT group delivers malware via updates for popular Chinese software | WeLiveSecurity
             Hackers are breaking into AT&amp;T email accounts to steal cryptocurrency | TechCrunch
             CISA, FDA warn of new Illumina DNA device vulnerability
             Apple and Google Set Joint Standards to Stop AirTag Stalking
             Many Public Salesforce Sites are Leaking Private Data – Krebs on Security
             Brother of man who ran Helix cryptocurrency mixer jailed for stealing 712 bitcoin
             Nearly 300 arrested in sprawling international dark web drug market takedown | CyberScoop
             Students’ psychological reports, abuse allegations leaked by ransomware hackers
             Mandiant CEO’s 7 tips for cyber defense | Cybersecurity Dive
             I Regret to Inform You That Bluesky Is Fun | WIRED</summary>
    <content type="html">
        <![CDATA[
            	
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:</p>

<ul>
  <li>Rob Joyce weighs in on AI and offsec</li>
  <li>Mysterious hacker doxes Russian intelligence agency bitcoin wallets</li>
  <li>Wired deep dives on SolarWinds</li>
  <li>AmeriCold food logistics giant suffers incident</li>
  <li>Iranian authorities roll low-tech spyware</li>
  <li>Much, much more</li>
</ul>

<p>This week’s show is brought to you by Greynoise. Its founder and CEO Andrew Morris is this week’s sponsor guest.</p>

<p>Links to everything that we discussed are below and you can follow <a href="https://infosec.exchange/@riskybusiness">Patrick</a> or <a href="https://infosec.exchange/@metlstorm">Adam</a> on Mastodon if that’s your thing.</p>

                
                
                <div class="panel panel-default">
                    <div class="panel-heading">
                        <h3 class="panel-title">Show notes</h3>
                    </div>
                    <div class="panel-body">
                        <ul>
                        
                          <li><a href="https://www.wired.com/story/nsa-rob-joyce-chatgpt-security/">NSA Cybersecurity Director Says ‘Buckle Up’ for Generative AI | WIRED</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/nsa-watching-generative-ai/649041/">3 areas of generative AI the NSA is watching in cybersecurity | Cybersecurity Dive</a></li>
                          <li><a href="https://therecord.media/russia-ransomware-attacks-logistics-supply-chain-ukraine">NSA cyber director warns of ransomware attacks on Ukraine, Western supply chains</a></li>
                          <li><a href="https://www.vice.com/en/article/qjvb4x/palantir-demos-ai-to-fight-wars-but-says-it-will-be-totally-ethical-dont-worry-about-it">Palantir Demos AI to Fight Wars But Says It Will Be Totally Ethical Don’t Worry About It</a></li>
                          <li><a href="https://twitter.com/thealexbanks/status/1651560588362002433?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">(1) Alex Banks on Twitter: &quot;Yesterday Palantir announced its Artificial Intelligence Platform. Here&#039;s how it transforms the future of military and defence: https://t.co/TcgN29wN19&quot; / Twitter</a></li>
                          <li><a href="https://www.coindesk.com/business/2023/04/27/russian-bitcoin-wallets-allegedly-exposed-by-apparent-hacker/">Russian Bitcoin (BTC) Wallets Allegedly Exposed by Apparent Hacker</a></li>
                          <li><a href="https://www.wired.com/story/solarwinds-hack-public-disclosure/">DOJ Detected SolarWinds Breach Months Before Public Disclosure | WIRED</a></li>
                          <li><a href="https://www.wired.com/story/the-untold-story-of-solarwinds-the-boldest-supply-chain-hack-ever/">SolarWinds: The Untold Story of the Boldest Supply-Chain Hack | WIRED</a></li>
                          <li><a href="https://therecord.media/cold-storage-company-americold-reports-cyberattack">Cold storage company Americold reports cyberattack to SEC</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/cisa-public-comment-software-security-attestation/648932/">CISA seeks public comment on software security attestation form | Cybersecurity Dive</a></li>
                          <li><a href="https://www.cisa.gov/sites/default/files/2023-04/secure-software-self-attestation_common-form_508.pdf">Secure Software Development Attestation Form Instructions</a></li>
                          <li><a href="https://therecord.media/csrb-legislation-congress-white-house-rob-silvers-rsac">DHS pushes Congress to formally establish Cyber Safety Review Board</a></li>
                          <li><a href="https://therecord.media/first-draft-of-un-cybercrime-treaty-expected-in-june">First draft of controversial UN Cybercrime Treaty slated for June</a></li>
                          <li><a href="https://cyberscoop.com/earn-it-stop-csam-encryption-privacy/">Return of the EARN IT Act rekindles encryption debate at critical moment for privacy-protecting apps | CyberScoop</a></li>
                          <li><a href="https://techcrunch.com/2023/05/01/apple-rapid-security-fixes/">Apple releases first ‘rapid’ security fixes for iPhones, iPads and Macs | TechCrunch</a></li>
                          <li><a href="https://www.lookout.com/blog/iranian-spyware-bouldspy">BouldSpy: Android Spyware Tied to Iranian Police Targets Minorities | Lookout</a></li>
                          <li><a href="https://www.welivesecurity.com/2023/04/26/evasive-panda-apt-group-malware-updates-popular-chinese-software/">Evasive Panda APT group delivers malware via updates for popular Chinese software | WeLiveSecurity</a></li>
                          <li><a href="https://techcrunch.com/2023/04/26/hackers-are-breaking-into-att-email-accounts-to-steal-cryptocurrency/">Hackers are breaking into AT&amp;T email accounts to steal cryptocurrency | TechCrunch</a></li>
                          <li><a href="https://therecord.media/illumina-dna-sequencing-devices-vulnerability-fda-cisa">CISA, FDA warn of new Illumina DNA device vulnerability</a></li>
                          <li><a href="https://gizmodo.com/airtag-apple-google-find-my-app-1850396569">Apple and Google Set Joint Standards to Stop AirTag Stalking</a></li>
                          <li><a href="https://krebsonsecurity.com/2023/04/many-public-salesforce-sites-are-leaking-private-data/">Many Public Salesforce Sites are Leaking Private Data – Krebs on Security</a></li>
                          <li><a href="https://therecord.media/brother-helix-crypto-mixer-jailed-stealing-bitcoin">Brother of man who ran Helix cryptocurrency mixer jailed for stealing 712 bitcoin</a></li>
                          <li><a href="https://cyberscoop.com/monopoly-market-takedown-fbi-europol/">Nearly 300 arrested in sprawling international dark web drug market takedown | CyberScoop</a></li>
                          <li><a href="https://www.nbcnews.com/tech/security/students-psychological-reports-abuse-allegations-leaked-ransomware-hac-rcna79414">Students’ psychological reports, abuse allegations leaked by ransomware hackers</a></li>
                          <li><a href="https://www.cybersecuritydive.com/news/mandiant-ceo-7-tips-cyber-defense/648917/">Mandiant CEO’s 7 tips for cyber defense | Cybersecurity Dive</a></li>
                          <li><a href="https://www.wired.com/story/bluesky-is-fun/">I Regret to Inform You That Bluesky Is Fun | WIRED</a></li>
                        </ul>
                    </div>
                </div>
                
                
            ]]>
    </content>
            <author>
            <name>Patrick Gray</name>
                                </author>
                <source>
                    <id>http://risky.biz/feeds/risky-business</id>
                            <title>Risky Business</title>
                </source>
    </entry>
        <entry>
    <id>https://risky.biz/RB703</id>
    <title type="html">Risky Business #703 -- Russia whines about its tech dependence on China</title>
    <link href="https://risky.biz/RB703" rel="alternate" />
    <updated>2023-04-25T19:00:00.000-05:00</updated>
    <published>2023-04-25T19:00:00.000-05:00</published>
    <summary>On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:


 The supply chain attack in the supply chain attack
 Russia has a China dependency problem
 Recent research into TLS resumption flaws
 Google and Intel team up on hardware hacking
 DHS will hack enterprise kit
 Much, much more


This week’s show is brought to you by Corelight. Brian Dye, Corelight’s CEO, is this week’s sponsor guest. He’s talking about the (actually sensible) ChatGPT-driven features Corelight has built into its NDR platform.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

        
        
        
          
            Show notes
          
          
            
            
             Software Maker 3CX Was Compromised in First-of-its-Kind Threaded Supply-Chain Hack - Updated
             Russia China Worries Set Out in Private Memo on Tech Risk - Bloomberg
             Hackers to show they can take over a European Space Agency satellite
             DOJ urges CISOs to continue working with law enforcement ahead of Uber security chief’s sentencing
             To combat cybercrime, US law enforcement increasingly prioritizes disruption | CyberScoop
             Collaboration between CISA, Cyber Command thwarted dangerous cyberattacks, officials said | CyberScoop
             US gov’t stopped Iranian hackers who ‘gained access’ to 2020 election infrastructure
             Bill proposes new DHS centers for testing security of critical government tech
             UK says ‘Wagner-like cyber groups’ attacking critical infrastructure
             Russia&amp;#39;s digital warriors adapt to support the war effort in Ukraine, Google threat researchers say | CyberScoop
             Bipartisan legislation aims to ‘arm Taiwan to the teeth in the cyber domain’
             Ex-NSA boss won $700,000 Saudi consulting deal after Khashoggi death - The Washington Post
             U.S. approves massive arms sale to Saudi Arabia, United Arab Emirates to counter Iran | PBS NewsHour
             Intel Let Google Cloud Hack Its New Secure Chips and Found 10 Bugs | WIRED
             Google’s Authenticator App Now Lets You Sync 2FA Codes Across Devices | WIRED
             We Really Need to Talk About Session Tickets | System Security Group
             Internet protocol vulnerability opens door to ‘massive’ DoS amplification attacks
             Exploit released for 9.8-severity PaperCut flaw already under attack | Ars Technica
             Finding PaperCut MF and NG servers
             DC health exchange breach traced back to misconfigured Amazon server
             Ukraine remains Russia’s biggest cyber focus in 2023
             The hacker Bassterlord in his own words: Portrait of an access broker as a young man
             Hacker Group Names Are Now Absurdly Out of Control | WIRED</summary>
    <content type="html">
        <![CDATA[
            	
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:</p>

<ul>
  <li>The supply chain attack in the supply chain attack</li>
  <li>Russia has a China dependency problem</li>
  <li>Recent research into TLS resumption flaws</li>
  <li>Google and Intel team up on hardware hacking</li>
  <li>DHS will hack enterprise kit</li>
  <li>Much, much more</li>
</ul>

<p>This week’s show is brought to you by Corelight. Brian Dye, Corelight’s CEO, is this week’s sponsor guest. He’s talking about the (actually sensible) ChatGPT-driven features Corelight has built into its NDR platform.</p>

<p>Links to everything that we discussed are below and you can follow <a href="https://infosec.exchange/@riskybusiness">Patrick</a> or <a href="https://infosec.exchange/@metlstorm">Adam</a> on Mastodon if that’s your thing.</p>

                
                
                <div class="panel panel-default">
                    <div class="panel-heading">
                        <h3 class="panel-title">Show notes</h3>
                    </div>
                    <div class="panel-body">
                        <ul>
                        
                          <li><a href="https://zetter.substack.com/p/software-maker-3cx-was-compromised">Software Maker 3CX Was Compromised in First-of-its-Kind Threaded Supply-Chain Hack - Updated</a></li>
                          <li><a href="https://archive.md/2WAVk#selection-3867.0-3879.384">Russia China Worries Set Out in Private Memo on Tech Risk - Bloomberg</a></li>
                          <li><a href="https://therecord.media/space-cybersecurity-satellite-hacked-esa-thales">Hackers to show they can take over a European Space Agency satellite</a></li>
                          <li><a href="https://therecord.media/doj-lisa-monaco-urges-cisos-to-work-with-gov-uber-sentencing">DOJ urges CISOs to continue working with law enforcement ahead of Uber security chief’s sentencing</a></li>
                          <li><a href="https://cyberscoop.com/doj-cybercrime-disruption-ransomware/">To combat cybercrime, US law enforcement increasingly prioritizes disruption | CyberScoop</a></li>
                          <li><a href="https://cyberscoop.com/information-sharing-cisa-cyber-commands-rsa-conference/">Collaboration between CISA, Cyber Command thwarted dangerous cyberattacks, officials said | CyberScoop</a></li>
                          <li><a href="https://therecord.media/cisa-cnmf-stopped-iranian-hackers-2020-election">US gov’t stopped Iranian hackers who ‘gained access’ to 2020 election infrastructure</a></li>
                          <li><a href="https://therecord.media/dhs-cyber-testing-centers-bill-rep-ritchie-torres">Bill proposes new DHS centers for testing security of critical government tech</a></li>
                          <li><a href="https://therecord.media/uk-ncsc-warning-cyber-groups-critical-infrastructure">UK says ‘Wagner-like cyber groups’ attacking critical infrastructure</a></li>
                          <li><a href="https://cyberscoop.com/russia-sandworm-ukraine-wagner-youtube/">Russia&#039;s digital warriors adapt to support the war effort in Ukraine, Google threat researchers say | CyberScoop</a></li>
                          <li><a href="https://therecord.media/bipartisan-legislation-aims-to-arm-taiwan-in-cyber">Bipartisan legislation aims to ‘arm Taiwan to the teeth in the cyber domain’</a></li>
                          <li><a href="https://archive.is/SeQRV#selection-377.0-389.140">Ex-NSA boss won $700,000 Saudi consulting deal after Khashoggi death - The Washington Post</a></li>
                          <li><a href="https://www.pbs.org/newshour/politics/u-s-approves-massive-arms-sale-to-saudi-arabia-united-arab-emirates-to-counter-iran">U.S. approves massive arms sale to Saudi Arabia, United Arab Emirates to counter Iran | PBS NewsHour</a></li>
                          <li><a href="https://www.wired.com/story/intel-google-cloud-chip-security/">Intel Let Google Cloud Hack Its New Secure Chips and Found 10 Bugs | WIRED</a></li>
                          <li><a href="https://www.wired.com/story/google-authenticator-app-sync-phones/">Google’s Authenticator App Now Lets You Sync 2FA Codes Across Devices | WIRED</a></li>
                          <li><a href="https://upb-syssec.github.io/blog/2023/session-tickets/">We Really Need to Talk About Session Tickets | System Security Group</a></li>
                          <li><a href="https://therecord.media/internet-protocol-vulnerability-opens-door-to-dos-attacks">Internet protocol vulnerability opens door to ‘massive’ DoS amplification attacks</a></li>
                          <li><a href="https://arstechnica.com/information-technology/2023/04/exploit-released-for-9-8-severity-papercut-flaw-already-under-attack/">Exploit released for 9.8-severity PaperCut flaw already under attack | Ars Technica</a></li>
                          <li><a href="https://www.runzero.com/blog/finding-papercut-servers/">Finding PaperCut MF and NG servers</a></li>
                          <li><a href="https://therecord.media/dc-health-exchange-breach-traced-to-aws-server">DC health exchange breach traced back to misconfigured Amazon server</a></li>
                          <li><a href="https://blog.google/threat-analysis-group/ukraine-remains-russias-biggest-cyber-focus-in-2023/">Ukraine remains Russia’s biggest cyber focus in 2023</a></li>
                          <li><a href="https://therecord.media/bassterlord-interview-hacker-initial-access-broker">The hacker Bassterlord in his own words: Portrait of an access broker as a young man</a></li>
                          <li><a href="https://www.wired.com/story/hacker-naming-schemes-spandex-tempest/">Hacker Group Names Are Now Absurdly Out of Control | WIRED</a></li>
                        </ul>
                    </div>
                </div>
                
                
            ]]>
    </content>
            <author>
            <name>Patrick Gray</name>
                                </author>
                <source>
                    <id>http://risky.biz/feeds/risky-business</id>
                            <title>Risky Business</title>
                </source>
    </entry>
        <entry>
    <id>https://redmondmag.com/webcasts/2023/05/microsoft-365-security-and-recovery-summit-may-5.aspx?tc=page0</id>
    <title type="html">Microsoft 365 Security and Recovery Summit</title>
    <link href="https://redmondmag.com/webcasts/2023/05/microsoft-365-security-and-recovery-summit-may-5.aspx?tc=page0" rel="alternate" />
    <updated>2023-04-16T20:43:15.000-05:00</updated>
    <published>2023-04-16T20:43:15.000-05:00</published>
    <summary>Join the editors of Redmondmag.com for this free half-day summit where they&#039;ll bring you together with independent experts who work with Microsoft 365 security and recovery day-in and day-out. They&#039;ll share their inside tips, best practices and everyday advice you can use that same day to improve your Microsoft 365 performance. Be sure to join us!</summary>
    <content type="html">
        <![CDATA[Join the editors of Redmondmag.com for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security and recovery day-in and day-out. They'll share their inside tips, best practices and everyday advice you can use that same day to improve your Microsoft 365 performance. Be sure to join us!
]]>
    </content>
                <source>
                    <id>http://redmondmag.com/rss-feeds/webcasts.aspx</id>
                            <title>Redmond Webcasts</title>
                </source>
    </entry>
    </feed>
